IS chapter 5-8

¡Supera tus tareas y exámenes ahora con Quizwiz!

Microsoft Word is an example of: A) open-source software. B) word-processing software. C) software productivity suite. D) data management software.

B

MySQL is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) mainframe relational DBMS. D) DBMS for desktop systems.

B

The most common Web server today, controlling 65 percent of the market, is: A) Microsoft IIS. B) WebSTAR. C) Apache HTTP Server. D) Netscape Server.

C

The most prominent data manipulation language today is: A) Access. B) DB2. C) SQL. D) Crystal Reports.

C

In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

True

In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog.

True

In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly altered to meet demand.

True

In-memory computing relies on a computer's main memory for storing data.

True

Increasingly, voice, video, and data communications are all based on Internet technology.

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

True

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

True

OLAP is a key tool of BI.

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

True

Public key encryption uses two keys.

True

SSL is a protocol used to establish a secure connection between two computers.

True

Smartphones have the same security flaws as other Internet-connected devices.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

True

Software localization refers to the entire process of converting software to operate in a second language.

True

Systems integration means ensuring the legacy systems work with new elements of the infrastructure.

True

Telephone networks are fundamentally different from computer networks.

True

The Domain Name System (DNS) converts domain names to IP addresses.

True

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

True

The trunk lines of the Internet are typically owned by network service providers.

True

To create a computer network, you must have at least two computers.

True

To secure mobile devices, a company will need to implement special mobile device management software.

True

Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.

True

Total cost of ownership components include costs for downtime, training, and support.

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

Viruses can be spread through e-mail.

True

VoIP technology delivers voice information in digital form using packet switching.

True

Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

True

Web browsers are the primary interface for accessing the Internet.

True

Web mining is the discovery of useful patterns on the Web.

True

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

True

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

True

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

True

XML provides a standard format for data exchange, enabling Web services to pass data from one process to another.

True

Microsoft Excel is an example of: A) data management software. B) spreadsheet software. C) presentation graphics. D) word processing software.

B

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

Most back-end databases are able to interpret HTML commands.

False

OLAP is used to find hidden patterns and relationships in large databases, and infer rules from these to infer future behavior.

False

One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.

False

Over 70 percent of malware today is aimed at small businesses.

False

Packet filtering catches most types of network attacks.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

SaaS providers deliver and provide Web-based, remote access to storage.

False

Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

False

TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer.

False

The distributed nature of cloud computing makes it somewhat easier to track unauthorized access.

False

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

False

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

False

The two key services of Hadoop are HDFS and in-memory computing.

False

The use of different terms for identifying data in a firm's various information systems is an example of redundant data.

False

Today, most system and application software is custom built by in-house programmers.

False

Using an online storage service such as DropBox is a type of virtualization.

False

XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.

False

Mobile search makes up approximately 10% of all Internet searches.

False (20%)

A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network.

False (switch, not a hub)

A DBMS makes the: A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different relational views. D) relational database available for different physical views.

A

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet.

A

A data ________ stores current and historical data of potential interest to decision makers throughout the company. A) warehouse B) mart C) archive D) mine

A

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: A) it typically focuses on a single subject area or line of business. B) all the information is historical. C) it uses a Web interface. D) all of the information belongs to a single company.

A

A digital certificate system: A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence.

A

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) foreign key.

A

A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing e-mail messages.

A

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot topped by a short mark.

A

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: A) war driving. B) sniffing. C) cybervandalism. D) driveby tapping.

A

A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. A) data quality audit B) systems analysis C) systems audit D) data analysis

A

All of the following are types of information systems general controls except: A) application controls. B) computer applications controls. C) physical hardware controls. D) administrative controls

A

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the: A) data dictionary. B) data definition diagram. C) entity-relationship diagram. D) relationship dictionary.

A

An example of a pre-digital database is a: A) library's card-catalog. B) cash register receipt. C) doctor's office invoice. D) list of sales totals on a spreadsheet.

A

An example of autonomic computing is: A) virus protection software that runs and updates itself automatically. B) software programmed to run on any hardware platform. C) cell phones taking on the functions of handheld computers. D) programming languages that allow non-programmers to create custom applications.

A

An independent computer program that copies itself from one computer to another over a network is called a: A) worm. B) Trojan horse. C) bug. D) pest.

A

Application controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. D) include software controls, computer operations controls, and implementation controls.

A

Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.

A

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program called Mitglieder was downloaded to the user's machine. The program enabled outsiders to infiltrate the user's machine. What type of malware is this an example of? A) Trojan horse B) Virus C) Worm D) Spyware

A

In Europe, and much of the world, the standard for cellular services is: A) GSM. B) LTE. C) Wi-Max. D) CDMA.

A

In TCP/IP, IP is responsible for: A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.

A

In a relational database, a record is also called a(n): A) tuple. B) row. C) entity. D) field.

A

In client/server computing, the client is: A) the computer that acts as the user point of entry. B) the location of the bulk of the processing. C) software program used for logging on to the network. D) the computer that firsts asks for services.

A

In clustering, a data mining tool will: A) find new groupings within data. B) find related predictions from existing values. C) find several events grouped by time. D) find new associations.

A

In co-location, a firm: A) purchases and owns their Web server but locates the server in the physical facility of a hosting service. B) contracts with an external vendor to run their computer center and networks. C) off-loads peak demand for computing power to remote, large-scale data centers. D) utilizes an external, distributed computing grid.

A

In terms of the data relationships found by data mining, sequences refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.

A

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless

A

The interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking is: A) UNIX. B) Linux. C) Mac OS. D) COBOL.

A

Linux: A) is a Windows-like operating system. B) plays a major role in running Web servers and local area networks. C) is the primary OS used in quantum computing. D) is designed to support only UNIX computers.

A

OLAP is a tool for enabling: A) users to obtain online answers to ad hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data.

A

Pharming involves: A) redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B) pretending to be a legitimate business's representative in order to garner information about a security system. C) setting up fake Web sites to ask users for confidential information. D) using e-mails for threats or harassment.

A

Phishing is a form of: A) spoofing. B) logging. C) sniffing. D) driving.

A

Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. A) packet switching B) routers C) servers D) coaxial cable

A

Running a Java program on a computer requires: A) a Java Virtual Machine to be installed on the computer. B) a Java Virtual Machine to be installed on the server hosting the Java applet. C) an applet to be downloaded to the user's computer. D) no extra or specialized software, as Java is platform-independent.

A

Software that manages the resources of the computer is called: A) system software. B) application software. C) data management software. D) network software.

A

Specific security challenges that threaten the communications lines in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware

A

Statements ranking information risks and identifying security goals are included in a(n): A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

A

The Gramm-Leach-Bliley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

A

The Internet poses specific security problems because: A) it was designed to be easily accessible. B) Internet data is not run over secure lines. C) Internet standards are universal. D) it changes so rapidly.

A

The child domain of the root is the: A) top-level domain. B) second-level domain. C) host name. D) domain extension.

A

The primary storage technologies are: A) storage networks, magnetic tape, magnetic disk, and optical disk. B) hard drives, magnetic tape, magnetic disk, and optical disk. C) storage networks, magnetic disks, hard disks, and optical disks. D) hard drives, removable drives, storage networks, and magnetic tape.

A

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data administration.

A

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops

A

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: A) total cost of ownership model. B) return on investment model. C) break-even point. D) cost benefit analysis.

A

To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire.

A

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third level domain. D) root domain.

A

Translating software to different languages is commonly referred to as: A) software localization. B) scaling. C) service-oriented architecture. D) outsourcing.

A

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A) DDoS B) DoS C) SQL injection D) phishing

A

What is the first step you should take in managing data for a firm? A) Identify the data needed to run the business B) Cleanse the data before importing it to any database C) Normalize the data before importing to a database D) Audit your data quality

A

What would be a reason for using a workstation rather than a personal computer? A) When you need more powerful computational abilities B) When you need to access a network C) When you need to serve applications and data to client computers D) When you need to share resources

A

Which of the following devices collects data directly from the environment for input into a computer system? A) Sensor B) Touch screen C) Audio input D) Trackball

A

Which of the following enables multiple users to create and edit Web documents? A) Wiki B) Blog C) Social networking D) Pinterest

A

Which of the following is a type of optical disk storage? A) CD-ROM B) Hard drive C) USB Flash drive D) Magnetic tape

A

Which of the following types of computer would you use to support a computer network? A) Server B) Mainframe C) Workstation D) PC

A

Which of the following would you use to find patterns in user interaction data recorded by Web servers? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining

A

Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet switching

A

Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP

A

Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? A) Peer-to-peer B) Wireless C) LAN D) Ring

A

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? A) Desktop publishing software B) Spreadsheet software C) Graphics software D) Presentation software

A

Within a corporate information services department, the task of creating the physical database and its logical relations are responsibilities of the ________ function. A) database administration B) data administration C) server administration D) data modeling

A

You use ________ to predict when a computer hardware system becomes saturated. A) capacity planning B) virtualization C) localization D) measured service

A

Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss from this exposure? A) $750 B) $1,000 C) $1,500 D) $3,000

A

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else. A) Identity theft B) Spoofing C) Social engineering D) Evil twins

A

________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms"

A

Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs

B

43) You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm? A) Wireless network B) Employees C) Authentication procedures D) Lack of data encryption

B

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) foreign key.

B

A network that spans a city, and sometimes its major suburbs as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN

B

A table that links two tables that have a many-to-many relationship is often called a(n): A) derived table. B) intersection relation. C) foreign table. D) entity-relationship table.

B

A(n) ________ allows users to interact with a computer by using several fingers to perform gestures without using a mouse or keyboard. A) GUI B) multitouch interface C) touch screen D) interface

B

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A) hot spot B) access point C) server D) wireless router

B

All of the following are tools or technologies for extracting information from unstructured data sets except: A) sentiment analysis software. B) SQL queries. C) Hadoop. D) Non-relational DBMS.

B

All of the following place strain on system capacity, except for: A) increased number of users. B) minimized response time for transaction processing. C) increased business volume. D) large numbers of interactive Web pages.

B

An example of phishing is: A) setting up a bogus Wi-Fi hot spot. B) setting up a fake medical Web site that asks users for confidential information. C) pretending to be a utility company's employee in order to garner information from that company about their security system. D) sending bulk e-mail that asks for financial aid under a false pretext.

B

DBMS typically include report-generating tools in order to: A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis

B

Data mining is a tool for allowing users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.

B

How do software vendors correct flaws in their software after it has been distributed? A) They issue bug fixes. B) They issue patches. C) They re-release the software. D) They release updated versions of the software.

B

IPv6 is being developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.

B

In a multitiered network: A) the work of the entire network is centralized. B) the work of the entire network is balanced over several levels of servers. C) processing is split between clients and servers. D) processing is handled by multiple, geographically remote clients.

B

In a table for customers, the information about a single customer would reside in a single: A) field. B) row. C) column. D) table.

B

In a telecommunications network architecture, a protocol is: A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.

B

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. A) high availability computing B) deep-packet inspection C) application proxy filtering D) stateful inspection

B

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? A) SSL B) Symmetric key encryption C) Public key encryption D) Private key encryption

B

Legacy systems are still in use today because: A) they can only be run on the older mainframe computers. B) they are too expensive to redesign. C) many integrate well using new Web services technologies. D) they contain valuable data that would be lost during redesign.

B

Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. A) 10 percent B) 25 percent C) 50 percent D) 80 percent

B

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) hotspots. C) hot points. D) wireless hubs.

B

Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as: A) grid computing. B) utility computing. C) client/server computing. D) autonomic computing.

B

Redirecting a Web link to a different address is a form of: A) snooping. B) spoofing. C) sniffing. D) war driving.

B

Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. A) intersection relations B) referential integrity rules C) entity-relationship diagrams D) foreign keys

B

Rigorous password systems: A) are one of the most effective security tools. B) may hinder employee productivity. C) are costly to implement. D) are often disregarded by employees.

B

Software used to apply the computer to a specific task for an end user is called: A) system software. B) application software. C) data management software. D) network software.

B

Specific security challenges that threaten corporate servers in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware.

B

The business case for using grid computing involves all of the following except: A) cost savings. B) centralized maintenance. C) speed of computation. D) agility.

B

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing

B

The development and use of methods to make computer systems resume their activities more quickly after mishaps is called: A) high-availability computing. B) recovery-oriented computing. C) fault-tolerant computing. D) disaster-recovery planning.

B

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC.

B

The main challenge coming to Microsoft's Office software suite will be: A) open-source, Linux-based suites such as StarOffice. B) Web-based productivity software such as Google Apps. C) mobile software. D) in-house, custom software created using open-source Web services.

B

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A) multiplexing. B) packet switching. C) packet routing. D) ATM.

B

The project operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected.

B

The use of multiple computers linked by a communications network for processing is called: A) grid computing. B) distributed processing. C) client/server computing. D) centralized processing.

B

Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: A) DSS. B) business intelligence. C) OLAP. D) data mining.

B

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming.

B

Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML

B

What are the relationships that the relational database is named for? A) Relationships between rows and columns B) Relationships between entities C) Relationships between fields and records D) Relationships between databases

B

What is the foundation technology for Web services? A) HTML B) XML C) SOAP D) UDDI

B

What is the primary difference between 3G and 4G cellular systems? A) 4G systems are digital. B) 4G systems have greater transmission speeds. C) 3G systems are unable to handle Web browsing. D) 3G systems have poor security.

B

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP

B

What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth

B

What type of device gathers data and converts them into electronic form for use by the computer? A) Output device B) Input device C) Optical storage D) Magnetic storage

B

Which of the following best describes the importance of creating an accurate data model for your business's database? A) It is not essential, as the data model itself is modified by the database continuously. B) Critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve C) Essential, as table relationships cannot be created without an accurate data model D) Somewhat important, as the type of data model will define what kinds of data will be stored

B

Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute ADDRESS C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER

B

Which of the following is a type of ambient data? A) Computer log containing recent system errors B) A file deleted from a hard disk C) A file that contains an application's user settings D) A set of raw data from an environmental sensor

B

Which of the following statements is not true about cloud computing? A) It consists of three types of services: cloud infrastructure, cloud platform, and cloud software. B) It removes the concern about data and systems security for businesses. C) It allows smaller firms to use resources previously unaffordable. D) It relies on the Internet as the platform for delivering services to users.

B

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN

B

You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A) one-to-many B) one-to-one

B

________ is free software created and updated by a worldwide community of programmers. A) An app B) Open-source software C) Cloud-based software D) A Web service

B

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies

B

h of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modifiability B) Scalability C) Expandability D) Disintermediation

B

57) An authentication token is a(n): A) device the size of a credit card that contains access permission data. B) type of smart card. C) gadget that displays passcodes. D) electronic marker attached to a digital authorization file.

C

A LAN would be used to connect all of the following except: A) all of the computers in a large building. B) all of the devices within a 10-meter area. C) all of the computers in a city. D) all of the computers in a small office.

C

A foreign country attempting to access government networks in order to disable a national power grid would be an example of: A) phishing. B) denial-of-service attacks. C) cyberwarfare. D) cyberterrorism.

C

A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram.

C

A set of self-contained services that communicate with each other to create a working software application is called: A) Web services. B) enterprise integration. C) SOA. D) ERP.

C

A software suite: A) includes capabilities for presentation graphics as well as text-editing and spreadsheets. B) provides functions to support the collaborative activities of workgroups, including software for group writing, information-sharing, and electronic meetings. C) includes full-featured versions of application software bundled as a unit. D) combines the functions of important PC software packages.

C

The WiMax standard can transmit up to a distance of approximately: A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.

C

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): A) security policy. B) AUP. C) risk assessment. D) business impact analysis.

C

Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.

C

Biometric authentication: A) is inexpensive. B) is used widely in Europe for security applications. C) can use a person's voice as a unique, measurable trait. D) only uses physical measurements for identification.

C

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten

C

Businesses use ________ tools to search and analyze unstructured data sets, such as e-mails and memos. A) Hadoop B) Web mining C) text mining D) OLAP

C

Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data.

C

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A) co-location. B) cloud computing. C) grid computing. D) autonomic computing.

C

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization

C

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: A) are easily decrypted. B) can be opened with easily available software. C) may be accessible by anyone who has access to the same network. D) are unprotected by up-to-date security systems.

C

For 100 percent availability, online transaction processing requires: A) high-capacity storage. B) a multi-tier server network. C) fault-tolerant computer systems. D) dedicated phone lines.

C

Hackers create a botnet by: A) infecting Web search bots with malware. B) using Web search bots to infect other computers. C) causing other people's computers to become "zombie" PCs following a master computer. D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.

C

Hadoop is a(n): A) NoSQL database technology that stores both data and procedures acting on the data as objects. B) data mining platform designed for storing and analyzing big data produced by Web communications and transactions. C) open-source software framework designed for distributing data-processing over inexpensive computers. D) pre-configured hardware-software system designed for analyzing big data

C

In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join.

C

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): A) TCO. B) SOA. C) SLA. D) API.

C

In terms of the data relationships found by data mining, associations refers to: A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.

C

In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? A) "http://", myspace, blogging, com B) "http://", com, blogging, myspace C) ".", com, blogging, myspace D) ".", myspace, blogging, com

C

Large amounts of data stored in electronic form are ________ than the same data in manual form. A) less vulnerable to damage B) more secure C) vulnerable to many more kinds of threats D) more critical to most businesses

C

Linux is: A) primarily concerned with the tasks of end users. B) designed for specific machines and specific microprocessors. C) an example of open-source software. D) especially useful for processing numeric data.

C

MongoDB and SimpleDB are both examples of: A) Open-source databases. B) SQL databases. C) NoSQL databases. D) Cloud databases.

C

Smaller firms may outsource some or many security functions to: A) ISPs. B) MISs. C) MSSPs. D) CAs.

C

Software applications that combine different components of online software applications are referred to as: A) integrated software. B) widgets. C) mashups. D) grid computing.

C

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A) system software. B) application software. C) data management software. D) network software.

C

T lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.

C

The "Internet of Things" refers to: A) the increasing focus on shopping as the major user activity on the Internet. B) the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. C) a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. D) the trend away from platform-independent Web applications to mobile-device specific apps.

C

The 802.11 set of standards is known as: A) WLAN. B) WSN. C) Wi-Fi. D) WiMax.

C

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers D) Client/server computing, packet switching, and HTTP

C

The Sarbanes-Oxley Act: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules.

C

The tool that enables users to view the same data in different ways using multiple dimensions is: A) Hadoop. B) SQL. C) OLAP. D) data mining.

C

The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve their distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? A) Mashups B) Extranet C) Web services D) Cloud computing

C

The type of logical database model that treats data as if they were stored in two-dimensional tables is the: A) two-tiered DBMS. B) pre-digital DBMS. C) relational DBMS. D) hierarchical DBMS.

C

Virtualization: A) allows one operating system to manage several physical machines. B) has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C) can boost server utilization rates to 70% or higher. D) allows smartphones to run full-fledged operating systems.

C

What are the four layers of the TCP/IP reference model? A) Physical, application, transport, and network interface B) Physical, application, Internet, and network interface C) Application, transport, Internet, and network interface D) Application, hardware, Internet, and network interface

C

Which of the following database types would be best suited for storing multimedia? A) SQL DBMS B) Open-source DBMS C) Non-relational DBMS D) Cloud-based database

C

Which of the following is a challenge posed by Wi-Fi networks? A) Lack of broadband support B) Connectivity issues with wired LANs C) Susceptibility to interference from nearby wireless systems D) High cost of infrastructure technology

C

Which of the following is an example of the "visual Web"? A) Twitter B) Blogger C) Pinterest D) Facebook

C

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.

C

Which of the following is not an example of a computer used as a target of crime? A) Knowingly accessing a protected computer to commit fraud B) Accessing a computer system without authority C) Illegally accessing stored electronic communication D) Threatening to cause damage to a protected computer

C

Which of the following is not one of the most important programming languages for business? A) Java B) C++ C) XML D) Visual Basic

C

Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web

C

Which of the following statements about the Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network.

C

Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining

C

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) PAN B) Domain-based LAN C) Peer-to-peer network D) Campus area network

C

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage. A) Software B) Administrative C) Data security D) Implementation

C

________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices. A) Capacity planning B) Cloud computing C) Green computing D) Autonomic computing

C

A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS

D

A characteristic or quality describing an entity is called a(n): A) field. B) tuple. C) key field. D) attribute.

D

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. A) service-oriented B) on-demand C) multitiered client/server D) two-tiered client/server

D

A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers, best describes: A) SSN. B) ASP. C) LAN. D) SAN.

D

A keylogger is a type of: A) worm. B) Trojan horse. C) virus. D) spyware.

D

A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.

D

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: A) in two short marks. B) in one short mark. C) with a crow's foot. D) with a crow's foot preceded by a short mark

D

A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of: A) phishing. B) pharming. C) spoofing. D) click fraud.

D

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. A) web server B) application server C) database server D) client server

D

Access is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) DBMS for midrange computers. D) DBMS for desktop PC systems.

D

An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called: A) grid computing. B) utility computing. C) cloud computing. D) autonomic computing.

D

Apps: A) lower the cost of switching mobile platforms. B) are an example of open-source software. C) tie the user to a particular hardware platform. D) require the user to have an online connection.

D

ChicagoCrime.org, which combines Google Maps with crime data for the city of Chicago, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup.

D

Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems. A) DPI B) MSSP C) NSP D) UTM

D

Currently, the protocols used for secure information transfer over the Internet are: A) TCP/IP and SSL. B) S-HTTP and CA. C) HTTP and TCP/IP. D) SSL, TLS, and S-HTTP.

D

Data mining is more ________ than OLAP. A) data focused B) multidimensional C) query oriented D) discovery driven

D

Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users.

D

In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A) scalable B) quantum C) autonomic D) hybrid cloud

D

Most antivirus software is effective against: A) only those viruses active on the Internet and through e-mail. B) any virus. C) any virus except those in wireless communications applications. D) only those viruses already known when the software is written.

D

Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large datasets are referred to as: A) Hybrid DBMS. B) Hadoop. C) BI. D) Analytic platforms.

D

Specific security challenges that threaten clients in a client/server environment include: A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware.

D

The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules

D

The logical view of a database: A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.

D

The most appropriate wireless networking standard for creating PANs is: A) I-mode. B) IEEE 802.11b. C) WiFi. D) Bluetooth.

D

The most basic business database is comprised of: A) three tables: for suppliers, parts, and sales. B) four tables: for customers, suppliers, parts, and sales. C) four tables: for customers, suppliers, sales, and employees. D) five tables: for customers, employees, suppliers, parts, and sales.

D

The most common type of electronic evidence is: A) voice-mail. B) spreadsheets. C) instant messages. D) e-mail.

D

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called: A) VPN. B) IAB. C) SEM. D) SEO.

D

The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.

D

The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched

D

What is the purpose of a DBMS's data definition function? A) Storing and managing the data in the database B) Storing definitions of data elements C) Normalizing the database D) Structuring the database

D

Which of the following is an open-source operating system designed for mobile devices? A) iOS B) OS X C) Chrome D) Android

D

Which of the following is considered by many to be the defining Web 2.0 application? A) Instant messaging B) E-mail C) Blogging D) Social networking

D

Which of the following is not a type of output device? A) Speakers B) Cathode ray tube C) Ink jet printer D) Keyboard

D

Which of the following is not a typical feature of DBMS? A) Data manipulation language B) Report generation tools C) Data dictionary D) Query wizard tool

D

Which of the following is not an example of a computer used as an instrument of crime? A) Theft of trade secrets B) Intentionally attempting to intercept electronic communication C) Unauthorized copying of software D) Breaching the confidentiality of protected computerized data

D

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys? A) TLS B) AUP C) VPN D) WPA2

D

Which of the following statements about RFID is not true? --- radio frequency identification A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.

D

Which of the following statements about data warehouses is not true? A) They store supply data to be used across the enterprise for management analysis and decision making. B) Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. C) They may include data from Web site transactions. D) Data warehouse systems provide easy-to-use tools for managers to easily update data.

D

Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app." B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

D

Which of the following storage technology stores data sequentially? A) CD-ROM B) RAID C) Magnetic disks D) Magnetic tape

D

Which of the following types of computer is used for weather forecasting? A) Mainframe B) Server C) Minicomputer D) Supercomputer

D

Which organization helps define the overall structure of the Internet? A) None (no one "owns" the Internet) B) W3C C) ICANN D) IAB

D

Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) Analog

D

________ identify the access points in a Wi-Fi network. A) NICs B) Mac addresses C) URLs D) SSIDs

D

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications

D

________ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the Web. A) XML B) SOA C) HTML D) Java

D

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards. A) "Legacy systems" B) "SSID standards" C) "Vulnerabilities" D) "Controls"

D

In linking databases to the Web, the role of the application server is to host the DBMS

False

A Web server is a dedicated computer that delivers Web pages to client computers.

False

A data warehouse is typically comprised of several smaller data marts.

False

A grouping of characters into a word, a group of words, or a complete number is called a record.

False

A mainframe is a type of legacy workstation.

False

Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support.

False

An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic.

False

An NOS must reside on a dedicated server computer in order to manage a network.

False

An SaaS provider maintains a large Web server, or series of servers, and provides fee-paying subscribers with space to maintain their Web sites.

False

An acceptable use policy defines the acceptable level of access to information assets for different users.

False

An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

False

An information policy specifies the procedures and rules for defining the structure and content of corporate databases.

False

Application server software is responsible for locating and managing stored Web pages.

False

Authorization refers to the ability to know that a person is who he or she claims to be.

False

Central large mainframe computing has largely replaced client/server computing.

False

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

False

Client/server computing is the most widely used form of centralized processing.

False

DoS attacks are used to destroy information and access restricted areas of a company's information system.

False

HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages.

False

IT infrastructure technology is the set of physical devices required to operate the entire enterprise.

False

Implementing a Web interface for a database requires changes to the database itself.

False

Fiber-optic cable is more expensive and harder to install than wire media.

True

Hadoop can process large quantities of any type of data, including video and Twitter feeds.

True

Hypertext markup language specifies how text, graphics, video, and sound are placed on a document.

True

A DBMS is special software for creating, storing, organizing, and accessing data from a database.

True

A computer language translation program is an example of system software.

True

A data warehouse may include information from legacy systems.

True

A firm's information policy lays out who is responsible for updating and maintaining the information in a database system.

True

A foreign key is a field that links to a separate table.

True

A physical view shows data as it is organized on the storage media.

True

A private cloud is operated by a single organization but may be managed by a third party and be located off premises.

True

A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.

True

A software package for a mainframe usually requires a programmer to install it.

True

A walkthrough is a type of software testing used before software is even written.

True

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

True

Both Oracle and Microsoft Access use SQL to retrieve information from the database.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Common Gateway Interface is a specification for processing data on a Web server.

True

Computer worms spread much more rapidly than computer viruses.

True

DBMS simplify how end users work with databases by separating the logical and physical views of the data.

True

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.

True

Data cleansing is the same process as data scrubbing.

True

End users use a data manipulation language to manipulate data in the database.

True

Every record in a file should contain at least one key field.

True

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years

True


Conjuntos de estudio relacionados

Chapter 13: Labor and Birth Process

View Set

Palabras y expresiones absolutas e indefinidas

View Set

Ch13license require/types- agents- CE- appt-fingrpr

View Set

Chapter 11: Community Mental Health

View Set

Pelvic Limb & Lymph App Questions

View Set

Chapter 1 quiz 1 Public Health for educated people

View Set