MIS 301

¡Supera tus tareas y exámenes ahora con Quizwiz!

________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.

3G

LTE is a __ cellular technology

4G

__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.

BPI

__ is a remote attack requiring no user action

DoS

hackers would use a botnet to perform a

DoS

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.

False

only a few __ satellites are needed for global coverate

GEO

__ was developed bc we have run out of IP addresses in the OG IP addressing scheme

IPv6

network that is restricted to a single building is a

LAN

Satellite telephone services are provided through __ satellites

LEO

________ satellites are used to run the GPS system.

MEO

the __ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected

Opt-out

Which of the following is FALSE of QR codes?

QR codes can be read from any direction or angle. QR codes can store much more information than bar codes. ***QR codes are larger than bar codes because they store information both horizontally and vertically. QR codes are more resistant to damage than bar codes.

which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivering, and reassembling data during transmission

__ is the most popular query language used for interacting with a database.

SQL

which of the following is the most prominent data manipulation language today?

SQL

__ is the protocol of the internet

TCP/IP

________ defines how messages are formulated and how their receivers interpret them.

TCP/IP

__ is a private network that uses a public network to connect users

VPN

The Internet is a __

WAN

which of the following is the correct order of networks from largest to smallest

WAN, MAN, LAN, PAN

__issues involve the authenticity, fidelity, and correctness of information that is collected and processed

accuracy

__ causes pop-up advertisements to appear on your screen

adware

In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.

affiliate marketing

The IT infrastructure is ___

all of the above put together (IT personnel; IT services; IT components)

each characteritic or quality of a particular entity is called a

attribute

which of the following is an accurate representation of the hierarchy from smallest to largest

bit, byte, field, record, file, database

bandwidth is stated in __ per second

bits

which of the following is NOT an example of alien software

blockware

________ is a short-range wireless network.

bluetooth

_________ organizations have physical and online dimensions.

clicks-and-mortar

the __ approach highlights the interlocking relationships that underlie all socieities

common good

which of the following would be an example of a SCADA attack

computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant

which of the following is the correct order of the KMS Cycle

create, capture, refine, store, manage, disseminate

__ is a disadvantage of fiber-optic cable

difficult to work with

the __ approach posits that ethical actions treat all human beings equally or if unequally then fairly based on some defensible standard

fairness

__ cables are made of glass

fiber-optic

is a communications control

firewall

the __ creates links between two tables

foreign

In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.

forward; higher

__ is not an advantage of twisted-pair wire

high bandwidth

a __ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations

hot

intellectual capital is another term for _

knowledge

__ is an example of pre-digital data storage that is comparable to a database

library card catalog

a data __ is a low-cost, scaled-down version of a data__ that is designed for the end-user needs in an SBU or an individual department

mart; warehouse

________ transmission systems transmit data through electromagnetic waves.

microwave

You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce

mobile

Dashboards are used in which process?

monitoring process performance

The ________ layer of TCP/IP provides communication and packet services.

network interface

the __ model of informed consent prohibits an organization from collecting any personal information unless the customer specially authorizes it

opt-in

the __ key is an identifier field that uniquely identifies a record

primary

__ refers to determining who is responsible for actions that were taken

privacy

With ________, customers use the internet to self-configure products or services.

product customization

in public-key encryption, the __ key is used for locking and the __ key is used for unlocking

public; private

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

radio

database systems minimize

redundancy

__ means that you accept the consequence of your decisions and actions

responbility

In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.

reverse; lower

The __ approach maintains that an ethical action is on that best protects and respects the moral rights of the affected parties

rights

each relational database table contains records (listed in__) and attributes (listed in __)

rows; columns

which of the following is not "unstructured data"

spreadsheet

__ collects personal information about users without their consent

spyware

under the convention of business flowchart, __ shape is used to represent questions. __ square shape is used to represent actions. how many branches should be followed by a question__?

triangle; square; 2

__ is an attack by a programmer developing a system

trojan horse

In ________, recipients of your marketing notices send information about your product to their friends.

viral marketing

_________ organizations are only online.

virtual

__ is a remote attack requiring user action

virus

which of the following is NOT a characteritc of big data

viscous

an informaiton system's __ is the likelihood that the system or resource will be comprised by a that will result in its __ to further attacks

vulnerability; threat; exposure

__ is the most difficult, radical, lengthy, and comprehensive strategy

BPR

_________ organizations are purely physical.

brick-and-mortar

a __ is a group of eight__

byte; bits

IT ___ can be used to create a competitive advantage__

can; when it is used effectively

__ cables are made of copper

coaxial

which of the following is a property issue

how should we handle illegally copying copyrighted softward?

careless internet surfing is __ and is an __ mistake

human error; unintentional

Which of the following is not in the business analytics domain

in-memory computing

__ is the right to determine when and to what extent information about you can be gathered and/or communicated to others

information privacy

an order from a customer is a(n) __ for a business process

input

An/The ________ is a network of networks.

internet

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.

internet

the __ model of informed consent permits the company to collect personal information until the customer specially requests that the data not be collected

opt-out

Whereas phishing attacks are __, denial of service attacks are __

remote attacks requiring user action; remote attacks requiring no user action

________ transmission systems can have a large coverage area but their signals experience propagation delay.

satellite

networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

software-defined

__ is pestware that users your computer as a launch pad for unsolicited email, usually advertising for products and services

spamware

keystroke loggers and screen scrapers are examples of

spyware

An electronic _________ is a website the represents a single store.

storefront

a foreign key is a primary key in another file

true

blacklisting is when everything can run except what is on the list

true

__ is a cable medium

twisted-pair

accoridng to the textbook, __ is the most widely available cable medium

twisted-pair

relational database model is based on the concept of __ dimensional tables

two

The __ approach states that an ethical action is the one that provides the most good or does the least harm

utilitarian

data __ is a repository of historical data that are organized by subject to support decision makers in the organization

warehouse


Conjuntos de estudio relacionados

Windows OS Chapter 13 Practice Test

View Set

*look OVER*CH94: Antiviral Agents II Drugs for HIV infection & Related Opportunistic Infections

View Set

Bowel Elimination: Davis Advantage (Exam 3)

View Set

GE Print & Schematic Reading (Final)

View Set

Economics: UNIT: MACROECONOMICS: POLICY AND ITS EFFECTS

View Set

ACC 202 - Chapter 2 Calculating Unit Product Costs

View Set

Module 5 Incident response and contingency planning

View Set

SoundByte Quiz Intellectual Property and Plagiarism

View Set