MIS 301- Iowa State University

¡Supera tus tareas y exámenes ahora con Quizwiz!

The IT infrastructure is____ .

- The IT personnel - The IT services - The IT components Answer: All of the above

________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.

3G

LTE is ________ cellular technology.

4G

_________ is an attack by a programmer developing a system.

A Trojan horse

_________ is a communications control.

A firewall

_________ refers to determining who is responsible for actions that were taken.

Accountability

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.

Accuracy

_________ causes pop-up advertisements to appear on your screen.

Adware

__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.

BPI

_________ is the most difficult, radical, lengthy, and comprehensive strategy.

BPR

________ is a short-range wireless network.

Bluetooth

_________ organizations are purely physical.

Brick-and-mortar

_________ organizations have physical and online dimensions.

Clicks-and-mortar

________ cables are made of copper.

Coaxial

________ is a disadvantage of fiber-optic cable.

Difficult to work with

Hackers would use a botnet to perform a _________.

DoS

_________ is a remote attack requiring no user action.

DoS

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.

False

________ cables are made of glass.

Fiber-optic

Only a few ________ satellites are needed for global coverage.

GEO

________ defines how messages are formulated and how their receivers interpret them.

HTTP

________ is NOT an advantage of twisted-pair wire.

High bandwidth

________ is an advantage of coaxial cable.

High bandwidth

Which of the following is a property issue?

How should we handle illegally copying copyrighted software?

________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

An/The ________ is a network of networks.

Internet

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.

Internet

A network that is restricted to a single building is a ________.

LAN

Satellite telephone services are provided through ________ satellites.

LEO

________ satellites are used to run the GPS system.

MEO

________ is a broadcast medium.

Microwave

________ transmission systems transmit data through electromagnetic waves.

Microwave

_________ issues involve collecting, storing, and disseminating information about individuals.

Privacy

Which of the following is FALSE of QR codes?

QR codes are larger than bar codes because they store information both horizontally and vertically.

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

Radio

_________ means that you accept the consequences of your decisions and actions.

Responsibility

Which of the following is NOT a basic function of TCP/IP?

Responsible for disassembling, delivering, and reassembling data during transmission

______ is the most popular query language used for interacting with a database.

SQL

________ transmission systems can have a large coverage area but their signals experience propagation delay.

Satellite

________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.

Software-defined

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.

Spamware

_________ collects personal information about users without their consent.

Spyware

Considering the following tables, ________ is a primary key.

Student Table: ID

________ is the protocol of the Internet.

TCP/IP

A foreign key is a primary key in another file.

True

________ is a cable medium.

Twisted-pair

_________ is a private network that uses a public network to connect users.

VPN

_________ organizations are only online.

Virtual

_________ is a remote attack requiring user action.

Virus

Which of the following is NOT a characteristic of Big Data?

Viscous

The Internet is a ________.

WAN

Which of the following is the correct order of networks from largest to smallest?

WAN, MAN, LAN, PAN

Careless Internet surfing is _________ and is an _________ mistake.

a human error; unintentional

In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.

affiliate marketing

Each characteristic or quality of a particular entity is called a(n) ________.

attribute

Which of the following is an accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

Bandwidth is stated in ________ per second.

bits

A ________ is a group of eight ________.

byte; bits

IT____be used to create a competitive advantage____ .

can; when it is used effectively

The _________ approach highlights the interlocking relationships that underlie all societies.

common good

Which of the following is the correct order of the KMS cycle?

create, capture, refine, store, manage, disseminate

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.

fairness

The ________ creates links between two tables.

foreign

In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.

forward; higher

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.

hot

An order from a customer is a(n) __________ for a business process.

input

Intellectual capital is another term for ________.

knowledge

A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.

mart; warehouse

You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce.

mobile

Dashboards are used in which of the following processes?

monitoring process performance

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

The ________ key is an identifier field that uniquely identifies a record.

primary

With ________, customers use the internet to self-configure products or services.

product customization

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.

public; private

Database systems minimize ________.

redundancy

In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.

reverse; lower

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.

rights

Each relational database table contains records (listed in _______) and attributes (listed in ______) .

rows; columns

Keystroke loggers and screen scrapers are examples of _________.

spyware

An electronic _________ is a website the represents a single store.

storefront

The ________ layer of TCP/IP provides communication and packet services.

transport

According to the textbook, ________ is the most widely available cable medium.

twisted-pair

The relational database model is based on the concept of ________-dimensional tables.

two

The _________ approach states that an ethical action is the one that provides the most good or does the least harm.

utilitarian

In ________, recipients of your marketing notices send information about your product to their friends.

viral marketing

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.

warehouse


Conjuntos de estudio relacionados

Apres Les Vacances Questions, Les Cours Questions, Les Chiffres Questions, L'Hiver Questions, Au Restaurant Questions, La Ville Questions

View Set

Porth's Ch 18 Somatosensory Function, Pain, and Headache

View Set

Chapter 2: Many Worlds: Geographies of Cultural Difference

View Set

AWS Cloud Practitioner - All Modules - Quiz

View Set

CCNA 2 v7 Modules 7 - 9 Quiz Answers

View Set