mis 301 midterm
adware
... causes pop-up advertisements to appear on your screen
high bandwidth
... is NOT an advantage of twister-pair wire
vpn
... is a private network that uses a public network to connect users
BPR
... is the most difficult, radical, lengthy, and comprehensive strategy
sql
... is the most popular query language used for interacting with a database
accuracy
... issues involve the authenticity, fidelity, and correctness of information that is collected and processed
responsibility
... means that you accept the consequences of your decisions and actions
software defined
... networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks
virtual
... organizations are only online
brick and mortar
... organizations are purely physical
accountability
... refers to determining who is responsible for actions that were taken
bluetooth
.... a short-range wireless network
coaxial
.... cables are made of copper
fiber optic
.... cables are made of glass
3g
.... cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging
spyware
.... collects personal information about users without their consent
http
.... defines how messages are formulated and how their receivers interpret them
microwave
.... is a broadcast medium
twisted pair
.... is a cable medium
firewall
.... is a communications control
difficult to work with
.... is a disadvantage of fiber optic cable
dos
.... is a remote attack requiring no user action
high bandwidth
.... is an advantage of coaxial cable
trojan horse
.... is an attack by a programmer developing a system
tcp/ip
.... is the protocol of the internet
privacy
.... issues involve collecting, storing, and disseminating information about individuals
clicks and mortar
.... organizations have physical and online dimensions
meo
.... satellites are used to run the gps system
satellite
.... transmission systems can have a large coverage area but their signals experience propagation delay
radio
.... transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted
ipv6
.... was developed because we have run out of ip addresses in the original ip addressing scheme
virus
..... is a remote attack requiring user action
spamware
..... is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services
microwave
..... transmission systems transmit data through electromagnetic waves
can when it is used effectively
IT ... be used to create a competitive advantage ...
hot
a ... site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations
byte bits
a .... is a a group of eight .....
mart warehouse
a data ... is a low-cost, scaled down version of a data .... that is designed for the end-user needs in an SBU or an individual department
warehouse
a data ... is a repository of historical data that are organized by subject to support decision makers in the organization
true
a foreign key is a primary key in another file.. true or false
lan
a network that is restricted to a single building is a .....
twisted pair
according to the textbook, ... is the most widely available cable medium
storefront
an electronic ... is website that represents a single store
input
an order from a customer is an .... for a business process
internet
an/the .... is a network of networks
competitive advantage
any assets that provide an organization with an edge against its competitors in some measure, such as cost, quality, speed
bits
bandwidth is stated in .... per second
human error unintentional
carless internet surging is ... and is an .... mistake
student table id
consider the following tables, .... is a primary key
monitoring process performance
dashboards are used in which of the following processes
redundancy
database systems minimize ....
attribute
each characteristic or quality of a particular entity is called an .....
rows columns
each relational database table contains records (listed in ....) and attributes (listed in.....)
dos
hackers would use a botnet to perform a ......
reverse lower
in .. auctions, one buyer wants to purchase a product or a service; these auctions result in ... prices over time
forward higher
in .... auctions, sellers solicit bids from many potential buyers; these auctions result in prices over time
viral marketing
in ...., recipients of your marketing notices send information about your product to their friends
affiliate marketing
in ....., vendors ask partners to place logo on the partner's website and then pay that partner a comission
public private
in public key encryption, the .... key is used for locking and the ... key is used for unlocking
knowledge
intellectual capital is another term for .....
BPI
is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process
spyware
keystroke loggers and screen scrapers are examples of .....
4g
lte is .... cellular technology
geo
only a few ... satellites are needed for global coverage
false of qr codes
qr codes are larger than bar codes because they store information both horizontally and vertically
not a basic function of tcp/ip
responsible for disassembling, delivering, and reassembling data during transmission
leo
satellite telephone services are provided through ... satellites
false
selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True or False?
foreign
the ... creates links between two tables
transport
the ... layer of tcp/ip provides communication and packet services
opt out
the ... model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected
rights
the .... approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties
fairness
the .... approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard
utilitarian
the .... approach states that an ethical action is the one that provides the most good or does the least harm
primary
the .... key is an identifier field that uniquely identifies a record
internet
the .... layer of tcp/ip is responsible for addressing, routing, and packaging data packets
opt in
the .... model informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it
common good
the ..... approach highlights the interlocking relationships that underlie all societies
components services personnel
the IT infrastructure is
wan
the internet is a .....
two
the relational database model is based on the concept of ..... dimensional tables
viscous
which of the following is NOT a characteristic of big data
how should we handle illegally copying copyrighted software?
which of the following is a property issue?
bit byte field record file database
which of the following is an accurate representation of the data hierarchy from smallest to largest?
wan man lan pan
which of the following is the correct order of networks from largest to smallest?
create capture refine store manage disseminate
which of the following is the correct order of the KMS cycle?
product customization
with ....., customers use the internet to self-configure products or services
mobile
you use your smartphone to look up how much money you have in your bank account. this is an example of .... commerce