IS Cronk test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world.

30, 1.5

Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market.

35 percent

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?

A failure of Amazon's cloud computing service

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability

Which of the following is not a U.S. federal law affecting private institutions?

Computer Matching and Privacy Protection Act

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which of the following allows users to add, change, delete, or retrieve data in a database?

Data manipulation language

Which of the following statements about data warehouses is not true?

Data warehouse systems provide easy-to-use tools for managers to easily update data.

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software?

Desktop publishing software

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital Divide

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following is not an example of the consumerization of IT?

Amazon Web Services

Which of the following is not an example of the potential dark side of big data?

Analyzing data from sensors installed in local parks to monitor soil moisture

The select operation in a relational database joins records from different tables.

False

The total cost of ownership refers to the direct costs of owning hardware and software.

False

Using an online storage service such as Dropbox is a type of virtualization.

False

Web servers can directly access a firm's back-end databases using HTML.

False

Which of the following is a type of optical drive storage?

Blu-ray

Common data quality problems include all of the following except:

Internet connectivity problems.

You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table?

One-to-one

The NAI is an industry association formed to help with which of the following?

Online privacy issues

Which of the following is not a file-sharing service?

Pandora

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

Patent law

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

MongoDB and SimpleDB are both examples of:

NoSQL databases

Which of the following database types would be best suited for storing multimedia?

Non-relational DBMS

Which of the following enables users to view the same data in different ways using multiple dimensions?

OLAP

Which of the following replaced the U.S. Department of Commerce safe harbor framework that enabled U.S. businesses to legally use personal data from EU countries?

Privacy shield

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n):

SLA

is a set of self-contained services that communicate with each other to create a working software application.

SOA

Which of the following is the most prominent data manipulation language today?

SQL

All of the following are tools or technologies for extracting information from unstructured data sets except:

SQL queries.

In lightweight PCs, smartphones, and tablets, which of the following have replaced hard drives?

SSD's

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

Scalability

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery slope rule

Which of the following statements about spam is not true?

Spam costs for business is not very high

Which of the following is not true about the GDPR?

The GDPR rejects the right to be forgotten.

Which of the following is considered the most important U.S. federal statute setting forth conditions for handling information about individuals?

The Privacy Act

Which of the following statements about client/server computing is not true?

The bulk of processing occurs on the client.

What is the digital divide and how does it impact society?

The digital divide is a social challenge that keeps people from taking advantage of public services through the Internet or other ICT channels. This paper will explore the concept of digital divide in Jordan, with a particular focus on the gender digital divide (GDD).

Which of the following best illustrates the relationship between entities and attributes?

The entity CUSTOMER with the attribute ADDRESS

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

The golden rule

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

True

Both Oracle and Microsoft Access use SQL to retrieve information from a database.

True

CGI is a specification for processing data on a web server.

True

Computer abuse refers to acts involving a computer that may not be illegal but are considered unethical.

True

Copyright is a legal protection given to creators of certain types of intellectual property.

True

DBMS simplify how end users work with databases by separating the logical and physical views of the data.

True

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.

True

Data cleansing is the same process as data scrubbing.

True

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

Every record in a file must contain at least one key field.

True

Gaining unapproved access to a computer is a federal crime.

True

Google Suite is an example of SaaS.

True

HTML specifies how text, graphics, video, and sound are placed on a document.

True

HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons in web pages.

True

Hadoop is an open source software framework for processing large quantities of any type of data, including video and Twitter feeds.

True

In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly obtained, increased, or decreased to meet demand.

True

In today's legal environment, managers who are convicted for the misuse of information systems are likely to be given a prison sentence.

True

In-memory computing relies on a computer's main memory for storing data.

True

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

True

Microsoft's Internet Explorer 11 web browser no longer includes an opt-out of tracking policy as the default.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

True

OLAP enables users to view data from different perspectives.

True

OLAP is used to quickly find answers to ad hoc questions.

True

One of the key concepts in patent law is originality.

True

Redundant data often stems from the use of different codes to identify the same data in a firm's various information systems.

True

Sentiment analysis is used to identify patterns in blogs and social media conversations to detect favorable and unfavorable comments.

True

Software localization refers to the entire process of converting software to operate in a second language.

True

Some experts believe that exposure to computers reduces intelligence.

True

Some forms of illegal sharing of music files have declined as legitimate online music stores have expanded.

True

System software manages the resources and activities of computers

True

Systems integration means ensuring the legacy systems work with new elements of the infrastructure.

True

The European Parliament has banned unsolicited commercial messaging.

True

The problem with web browsers' Do Not Track options is that websites aren't obligated to honor these settings.

True

Total cost of ownership components include costs for downtime, training, and support.

True

Two key services of Hadoop are HDFS and HBase non-relational database.

True

Web beacons are tiny, invisible software programs hidden in email messages and web pages that are used to track and report a user's online behavior.

True

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

True

Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking?

UNIX

Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites?

Web structure mining

The smallest unit of data a computer can handle is called a:

bit

Capabilities and tools to manage and analyze large quantities and different types of data from multiple sources are collectively known as:

business intelligence infastructure

Virtualization:

can boost server utilization rates to 70% or higher.

You use ________ to predict when a computer hardware system becomes saturated.

capacity planning

The business case for using grid computing involves all of the following except:

centralized maitenance

All of the following are traditional storage technologies except:

cloud computing

Which of the following is considered to be the fastest-growing form of computing?

cloud computing

Which of the following protects the authors of a book from having their work copied by others?

copyright law

The select operation:

creates a subset consisting of all records in the file that meet stated criteria.

The project operation:

creates a subset consisting of columns in a table.

A ________ is a repository for raw unstructured data or structured data that for the most part have not yet been analyzed.

data lake

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called:

data management software.

Which of the following is the most common reason that business systems fail?

data quality

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing

All of the following are technical solutions to protecting user privacy except:

data use policies

As described in the chapter case, the Charlotte Hornets used a ________ to consolidate fan data from multiple sources.

data warehouse

Within a corporate information services department, the task of establishing the physical database and its logical relations are responsibilities of the ________ function.

database administration

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS.

database server

Data mining is more ________ than OLAP.

discovery driven

DBMS typically include report-generating tools in order to:

display data in an easier-to-read-format.

The use of multiple computers linked by a communications network for processing is called:

distributed processing

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

due process

Digital media differs from a physical book in all of the following ways except:

ease of establishing uniqueness.

A schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram.

In terms of the data relationships found by data mining, sequences refers to:

events linked over time.

In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods.

hybrid cloud

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

In a business relational database, tables contain:

one table for each entity.

provides users with free access to its program code.

open source software

Hadoop is a(n):

open-source software framework designed for distributing data-processing over inexpensive computers.

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

A DBMS makes the:

physical database available for different logical views.

Links pointing to an online document are a sign of:

popularity.

The logical view of a database:

presents data as they would be perceived by end users.

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key.

As discussed in the chapter case, all of the following are benefits of wearable computing devices except:

processing customer credit card information.

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

property rights and obligations

In co-location, a firm:

purchases and owns their Web server but locates the server in the physical facility of a hosting service.

Which of the five moral dimensions of the information age does spamming involve?

quality of life

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

________ means that you accept the potential costs and obligations for the decisions you make.

responsibility

Links coming out of an online document are a sign of:

richness or variety of topics covered.

In a table for customers, the information about a single customer would reside in a single:

row.

________ refers to the ability of a system to expand to serve a number of users without breaking down.

scalability

In a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join.

Which of the following devices collects data directly from the environment for input into a computer system?

sensor

Which of the following types of computers would you use to support a computer network?

server

Translating software to different languages is commonly referred to as:

software localization.

Which of the following software tools would you use to prepare a break-even analysis?

spreadsheet

Microsoft Excel is an example of:

spreadsheet software

Which of the following types of computers are used for weather forecasting on a national or worldwide scale?

supercomputer

Software that manages the resources of the computer is called:

system software

Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos.

text mining

All of the following laws apply to actions by the federal government except:

the Children's Online Privacy Protection Act.

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except:

the minimum response time for processing business transactions.

All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except:

the monetary value of the crime.

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

the opt in model

An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except:

the purchase price of new computer hardware equipment.

According to ________, you should take the action that produces the least harm.

the risk aversion principle

In a multi tiered network:

the work of the entire network is balanced over several levels of servers.

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a:

total cost of ownership model

Which of the following is not a type of input device?

trackball

Advances in data storage and rapidly declining data storage costs have been responsible for multiplying databases on individuals maintained by private and public organizations.

true

In a relational database, a record is also called a(n):

tuple.

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture.

two-tiered client/server

All of the following are techniques being used to make data centers more "green" except:

use of backup generators.

Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems?

visual basic

A data ________ stores current and historical data of potential interest to decision makers throughout the company.

warehouse

The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following?

web services

The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution?

web services

Which of the following would you use to find patterns in user interaction data recorded by web servers?

web usage mining

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends:

with a crow's foot preceded by a short mark.

Microsoft Word is an example of:

word processing software

Software programs were unprotected by copyright law until the early 1990s.

False

Text mining is the discovery of useful patterns on the web.

False

Identify the five moral dimensions that are involved in political, social, and ethical issues and briefly describe each. Of these, which do you think is the most difficult for society to deal with? Support your opinion.

(1) Information rights and obligations. What rights do individuals and organizations have with respect to information pertaining to them? (2) Property rights. How can intellectual property rights be protected when it is so easy to copy digital materials? (3) Accountability and control. Who will be held accountable and liable for the harm done to individual and collective information and property rights? (4) System quality. What standards of data and system quality should we demand to protect individual rights and the safety of society? (5) Quality of life. What values should be preserved? What institutions must we protect?

The Online Privacy Alliance:

-encourages self-regulation to develop a set of privacy guidelines for its members

How many transactions per day can the IBM Z13 mainframe process?

2.5 billion

One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware.

False

Which of the following is an open-source operating system designed for mobile devices?

Android

Which of the following is an example of a company whose business model is based on access to large databases through the web?

Facebook

A SaaS provider maintains a large web server, or series of servers, and provides fee-paying subscribers with space to maintain their websites.

False

A data warehouse is best used for storing unstructured data.

False

A grouping of characters into a word, a group of words, or a complete number is called a tuple

False

A logical view of data shows data as it is organized on the storage media.

False

A mainframe is a type of legacy workstation.

False

Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support.

False

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

False

An information policy specifies the procedures and rules for defining the structure and content of corporate databases.

False

Application server software is responsible for locating and managing stored web pages.

False

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

False

Client/server computing is the most widely used form of centralized processing.

False

Desktop PCs, laptops, and smartphones are the primary interface for accessing the Internet.

False

In client/server computing, the server provides users access to system resources.

False

In linking databases to the web, the role of the application server is to host the DBMS.

False

Microsoft Access is a database management system for large mainframes computers.

False

Which of the following is the world's largest collector of online user data?

Google

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPPA

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family.

The National Institute of Standards (NIST) defines cloud computing as having all of the following characteristics except:

IDK

Which of the following best describes Immanuel Kant's categorical imperative?

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not one of the current key technology trends that raises ethical issues?

Increase in data qualitiy

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

Which of the following best describes the importance of creating an accurate data model for your business's database?

It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

Which of the following statements is not true about cloud computing?

It removes the concern about data and systems security for businesses.

All of the following are examples of wearable computing devices except:

Linux is the primary OS used in quantum computing.

FIP principles are based on a belief in which of the following?

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of Life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

RSI

________ are not held liable for the messages they transmit.

Regulated common carriers

Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables?

Relational DBMS

What are the relationships that the relational database is named for?

Relationships between entities

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

A Facebook user's visit to a website can be tracked even if they do not click a Like button.

True

A data warehouse extracts current and historical data from multiple operational systems in an organization.

True

A firm's IT infrastructure provides the foundation for supporting all the information systems in the business.

True

A firm's information policy lays out who is responsible for updating and maintaining the information in a database system.

True

A foreign key is a field that links to a separate table.

True

A private cloud is operated for the benefit of a single organization but may be managed by a third party and located off premises.

True

A service level agreement specifies the nature and level of services provided by service providers.

True

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

True

The FIP principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

What would be a reason for using a workstation rather than a personal computer?

When you need more powerful computational abilities

What is the foundation technology for web services?

XML

Running a Java program on a computer requires:

a Java Virtual Machine to be installed on the computer.

ZipRealty, which combines Google Maps with real estate data, is an example of:

a mashup

Linux is:

an example of open-source software.

Rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is referred to as:

an information policy.

Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large data sets are referred to as:

analytic platforms.

Software used to apply the computer to a specific task for an end user is called:

application software

Non-relational databases:

are used to store structured and unstructured data.

All of the following are steps in the process for analyzing an ethical issue except:

assigning responsibility.

A characteristic or quality describing an entity is called a(n):

attribute.

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

CVS refers to:

eyestrain related to computer display screen use.

Due process is a feature of political systems and allows individuals to recover damages done to them by others.

false

Identifying the stakeholders—people who have a vested interest in the outcome of the decision—is the last step in analyzing an ethical issue.

false

Today, most system and application software is custom built by in-house programmers.

false

XML is limited to describing how data should be presented in the form of web pages, while HTML can perform presentation, communication, and storage of data.

false

Data mining is a tool for allowing users to:

find hidden relationships in data

The most basic business database is comprised of:

five tables: for customers, employees, suppliers, parts, and sales.

________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices.

green computing

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:

grid computing

Big data refers to any database that:

has a large volume and variety of data.

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:

in two short marks.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

What type of device gathers data and converts them into electronic form for use by the computer?

input device

A table that links two tables that have a many-to-many relationship is often called a(n):

intersection relation.

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:

it typically focuses on a single subject area or line of business.

is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web.

java

A field identified in a record as holding the unique identifier for that record is called the:

key field

Software applications that combine different components of online software applications are referred to as:

mashups

In clustering, a data mining tool will find:

new groupings within data.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization.

OLAP is a tool that enables users to:

obtain online answers to ad hoc questions in a rapid amount of time.

In terms of the data relationships found by data mining, associations refers to:

occurrences linked to a single event.


Conjuntos de estudio relacionados

5.5 Circuits Schematics & Symbols, Current & Voltage formulas

View Set

TExES Social Studies 7-12 (World History)

View Set

Orientation to the Body - Cavities & Linings

View Set

Introduction User - Centered Design

View Set

Chapter 12 and 39- female pelvis scanning protocol

View Set

Chapter 16: The Endocrine System

View Set

DL: Convolutional Neural Networks "CNNs"

View Set

Grammar Active and Passive Voice

View Set