IS212 Ch 5&6 study questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Although _____ does not have any pre-defined markup tags, it is used as the markup language for Web documents containing structured information, including words and pictures. -Extensible Markup Language (XML) -Hypertext Markup Language (HTML) -Standard Generalized Markup Language (SGML) -Hypermedia/Time-based Structuring Language (HyTime)

Extensible Markup Language (XML)

Which of the following is used to define the contents of a Web page or group of pages? -Cascading Style Sheets (CSS) -Java -JavaScript -Extensible Markup Language (XML)

Extensible Markup Language (XML)

A database, a database management system, and the application programs that use the data make up the communication environment in an organization. True/False

False

A major advantage of NoSQL databases is the lateral dissemination capability, which enables hundreds or even thousands of servers to operate on the data, providing faster response times for queries and updates. True/False

False

Cascading Style Sheets (CSS) tell the browser how to display font characteristics, paragraph formatting, page layout, image placement, hyperlinks, and the content of a Web page. True/False

False

On a client/server system, a server is any computer on a network that sends messages requesting services from the clients on the network. True/False

False

One drawback to cloud computing is that an organization can only access whatever technology is available through its provider, which may not be state-of-the-art. True/False

False

Private cloud computing refers to deployments in which service providers offer their cloud-based services to the general public. True/False

False

Some Web developers are creating programs and procedures to combine two or more Web applications into a new service, called a duo. True/False

False

The Web is the infrastructure on which the Internet exists. True/False

False

The database approach to managing data is not as good as the traditional file-based approach, where each operational system uses its own data files. True/False

False

Assume that your home's appliances have an IP address. They are part of the ______. -virtual private network -satellite communication network -Internet of Things -Internet

Internet of Things

if you wish to use a visual approach to query building, you would use ________. -SQL -noSQL -Query by Example -Windows

Query by Example

_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. -Java -COBOL -DML -SQL

SQL

Sometimes incomplete, incorrect, inaccurate, or irrelevant data has to cleaned. This can be corrected or deleted through data scrubbing. True/False

True

The Internet Protocol enables traffic to be routed from one network to another as needed. True/False

True

The World Wide Web is a hyperlink-based system that uses a client/server model. True/False

True

Web development software helps the designer keep track of all the hyperlinks that connect to the files. True/False

True

Web browser software programs, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, are used to view Web pages. They are known as _____. -Web servers -Web engines -Web clients -development tools

Web clients

The _______________ allows users to relate data in new ways without having to redefine complex relationships. -ability to link relational tables -accuracy of data -redundancy in data -ability to use the SELECT query

ability to link relational tables

In a bus network, ________. -all network devices are connected to a common backbone that serves as a shared communications medium -multiple access points are used to link a series of devices that speak to each other to form a network connection across a large area d. -all network devices connect to one another through a single central device called the hub node -each computer is directly connected with all other computers

all network devices are connected to a common backbone that serves as a shared communications medium

Data governance is defined as the set of policies and procedures that control how data is collected, stored, and maintained by an organization. True/False

false

In the relational database model, each row of a table represents a record. True/False

false

Intranets are browser-based networks that connect people who are external to the company. True/False

false

Java is a popular programming language created by Microsoft. True/False

false

MS Access is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. True/False

false

Messages on the Internet are typically sent through one or more satellites to reach their destination. True/False

false

One of the primary disadvantages of a relational database is that it allows large amounts of redundancy among data. True/False

false

Records form the smallest piece of information in the data hierarchy. True/False

false

Ron is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use "joining" to create his new database. True/False

false

Sensors that can monitor and report on data about traffic and parking conditions are part of a network of physical objects known as the Internet of Traffic. True/False

false

Suppose we have a table that stores Instructors data. Within it, there is a field called "instructorID" that uniquely identifies each instructor record. This field is known as the ID key. True/False

false

The relational model can place data in one-dimensional, two-dimensional, or three-dimensional tables. True/False

false

Usually measured in pulses per minute (ppm), channel bandwidth refers to the rate at which data is exchanged. True/False

false

Wrapping is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. True/False

false

if an organization uses the traditional approach to data management, it would have multiple information systems sharing a pool of related data. True/False

false

HTML, the standard language for page description language for Web pages, is in its _____. -third revision -fifth revision -second revision -ninth revision

fifth revision

A search engine is a valuable tool that enables a user to _______. -create Web pages -learn programming -find information on the Web -create online games

find information on the Web

The access method in a Web address tells your software to access a file using the ______ protocol. -mail transfer -uniform resource location -hyper-text transfer -domain name server

hyper-text transfer

Search engine optimization _________. -is a process for driving traffic to a Website by improving the site's ranking in search engines -is the same as running the server at a steady pace -is the same as fine tuning search engines -is a technique for minimizing load times

is a process for driving traffic to a Website by improving the site's ranking in search engines

In a relational database model, the cost of performing data cleansing or data scrubbing can be quite high. True/False

true

In the context of the relational database model, joining involves combining two or more tables. True/False

true

Network management includes a wide range of technologies and processes that monitor the network and help identify and address problems before they can create a serious impact. True/False

true

Public cloud computing may not be suitable for organizations that are handling sensitive data. True/False

true

The primary key is used to distinguish records so that they can be accessed, organized, and manipulated. True/False

true

Unstructured data comes from sources such as social media, email, and surveillance video. True/False

true

While building a database, an organization must carefully consider content, access, logical structure, and physical organization. True/False

true

f an organization is taking a "store everything" approach to data, it will save all the data in its raw and unaltered form in a data lake. True/False

true

oT sensors are used extensively in the utilities industry to predict when critical pieces of equipment or power lines are about to fail so that quick, anticipatory corrective action can take place before any failure. True/False

true

A primary key is a field or set of fields in a record that _______. -is the most important field or field set -uniquely identifies the record -is always 1 -always resides in the first column of the database

uniquely identifies the record

Leila's employer, a major auto manufacturer, has asked her to capture and review the tsunami of social media posts and customer service emails about their company's latest recall. In terms of the characteristics of big data, Leila is dealing with ________. -variety -velocity -volume -veracity

variety

The _________ takes the information from the Internet, translates it into a radio signal, and sends it to the device's wireless adapter. -bluetooth signal -charging station -wireless access point -satellite signal

wireless access point

_____ is used within a Web page to describe and transfer data between Web service applications. -XML -A database table -HTML -CSS

xml

Geolocation services provide ______. -location-specific business information -mobile Internet access -assistance in finding the ideal location for a new business -free access to the Internet while on the road

-location-specific business information

How many bits make up a byte? -16 -8 -4 -12

8

Which of the following statements is true of a star network? -Multiple access points are used to link a series of devices that speak to each other to form a network connection across a large area. -All network devices are connected to a common backbone that serves as a shared communications medium. -A failure in any link of the star network will isolate only the device connected to that link. -Each computer is directly connected with all other computers in the network.

A failure in any link of the star network will isolate only the device connected to that link.

If "temperature" is an attribute, then "80 degrees" is a data item. True/False

true

Which of the following statements is true of a database? -It provides an essential foundation for an organization's computer network. -It is an unstructured collection of bits of data. -It can contribute to organizational success by providing timely, accurate, and relevant information built on data. -It will constantly troll the Internet for additional data.

It can contribute to organizational success by providing timely, accurate, and relevant information built on data.

Why hasn't social journalism replaced traditional journalism? -It may not be as reliable as mainstream media sources. -It is not widely available. -It costs more. -It is a good source for facts.

It may not be as reliable as mainstream media sources.

Which of the following allows consumers to swipe their credit cards—or even their smartphones—within a few inches of point-of-sale terminals to pay for purchases? -Wireless mesh -Near field communication (NFC) -Microwave transmission -Wi-Fi

Near field communication (NFC)

Which of the following statements is true of network-management software? -With network-management software, a manager on a networked personal computer can spy on anyone else's computer. -Network-management software allows software to be copied, modified, or downloaded legally or illegally. -One of the disadvantages of network-management software is the large amount of time spent on routine tasks. -Network-management software simplifies the process of updating files and programs on computers on the network.

Network-management software simplifies the process of updating files and programs on computers on the network.

A DBMS is a group of programs used as an interface between a database and application programs or a database and the user. True/False

True

A collection of data fields that are all related to one object, activity, or individual is called a record. True/False

True

A virtual private network (VPN) supports a secure, encrypted connection between two points on the Internet. True/False

True

Home and small business networks are being set up to connect computers, printers, scanners, and other devices. True/False

True

If you wish to display photos in a slideshow style, use JavaScript code. True/False

True

Large database systems typically use schemas to define the tables and other database features associated with a person or user. True/False

True

Organizations are using the IoT to capture and analyze streams of sensor data to detect patterns and anomalies. True/False

True

Perhaps the most important decision in moving to a cloud environment is to choose your cloud provider wisely. Migrating to a new provider is costly and time-consuming so you wouldn't want to do it twice. True/False

True

Some IS departments are creating a new position—video content manager—who will create and post videos to public Websites. True/False

True

Some people have privacy concerns about the fact that corporations are harvesting huge amounts of personal data that can be shared with other organizations. True/False

True

SQL databases conform to ACID properties, which stands for _______. -automation, currency, isolation, durability -atomicity, consistency, isolation, durability -atomicity, consistency, independence, durability -automation, consistency, independence, durability

atomicity, consistency, isolation, durability

Using _______ technology, users of multifunctional devices can synchronize data on their devices with information stored in a desktop computer, send or receive faxes, and print. -Wi-Fi -near field communication -Bluetooth -infrared

bluetooth

Melissa is a photographer, and she'd like to publish her photos online. Melissa ____________. -can use Flickr to post photos -will need to learn Java -will need her own server and IT people to run the server -will need to run her own web server on leased servers

can use Flickr to post photos

In a database, bits can be organized into bytes, and each byte represents is a(n) ______. -file -attribute -record -character

character

The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database is called ________. -data cleansing -enterprise data modeling -data selecting -social graph analysis

data cleansing

Suppose you wish to find what tables are in a database, what fields they have, and how they are related. You would review the _____. -attributes -data dictionary -SQL commands -sample data

data dictionary

If you had a job where you were responsible for setting policies and managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data, you would be a ________. -data manager -database administrator -data steward -data lifecycle manager

data lifecycle manager

A ______ is the highest level of data hierarchy. -database -record -field -file

database

William works at a paper goods distributor. He is responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in the organization. William is a ________. -data administrator -database administrator -data steward -data manager

database administrator

A data definition language is a collection of instructions and commands used to __________. -cleanse the data in a database -define and describe data and relationships in a specific database -retrieve data from a database -administer a database server

define and describe data and relationships in a specific database

What is the main purpose of LinkedIn? -finding long-lost friends -obtaining information about local services -developing your professional network -reading reviews of various products

developing your professional network

Which of the following is NOT one of the popular categories of NoSQL databases? -key-value NoSQL -graph NoSQL -dimensional NoSQL -document NoSQL

dimensional NoSQL

The primary concern of the Internet Corporation for Assigned Names and Numbers (ICANN) is to make sure that each _________ represents only one individual or entity. -Web page -IP address -email ID -domain name

domain name

A(n) __________ uses basic graphical symbols to show the organization of and relationships between data. -enterprise data model -data diagram -data model -entity-relationship diagram

entity-relationship diagram

A data dictionary describes the meanings of data elements that are in a different language. True/False

false

A record is typically a name, number, or combination of characters that describes an aspect of a business object, such as a location. True/False

false

Iridium Communications provides a global communications network that spans the entire Earth, using 66 satellites in a near-polar orbit at an altitude of 485 miles. These are known as ______ satellites. -microwave -low earth orbit (LEO) -very small aperture terminal (VSAT) -geostationary

low earth orbit (LEO)

Each attribute in a ________ model can be constrained to a range of allowable values called a domain. -relational database -NoSQL database -traditional database -flat file

relational database

If you have weekly sales data and you wish to get monthly sales data, then use the ______ feature. -drill down -slice and dice -roll up -extract data

roll up

Which of the following is NOT a common challenge related to the use of the Internet of Things? -slow Internet speeds -security risks -faulty sensors providing inaccurate or incomplete data -data lacking time stamps

slow Internet speeds

A data mart is a ______. -simplified data model -subset of a data warehouse -portable data dictionary -schema that is available for sale

subset of a data warehouse

If the receiving and sending computers are not directly connected to the same network, the sending computer relays the message to another computer that can forward it using _____. -a Uniform Resource Locator (URL) -the Internet Protocol (IP) -the ARPANET -a Wi-Fi

the Internet Protocol (IP)

With Database as a Service, the database is stored on a service provider's server and accessed by the client over _______. -4GL -a cellular network -the Internet -WiFi

the internet

In a data warehouse, during which stage of the ETL process is the data subjected to a series of rules or algorithms that will derive the data that's meant to be stored from the rest? -transform -transfer -extract -load

transform

A blog is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. True/False

true

A database should be designed to store all data relevant to the business and provide quick access and easy modification. True/False

true

A podcast is an audio blog that is accessed over the Internet. True/False

true

An entity is a general class of people, places, or things for which data is collected, stored, and maintained. True/False

true

Content streaming is a method of transferring large media files over the Internet so that the data stream of voice and pictures plays more or less continuously as the file is being downloaded. True/False

true


Conjuntos de estudio relacionados

SY-501 9-20-2018 Exam Questions FROM K:

View Set

Encapsulation, Inheritance, and Polymorphism

View Set

Chapter 1 The Human Body: An Orientation Questions

View Set