MIS 301 Midterm exam review

¡Supera tus tareas y exámenes ahora con Quizwiz!

what does binary mean?

0 or 1

________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging. 1G 2G 3G 4G

3G

LTE is ________ cellular technology. 2G 4G 3G 5G

4G

how many bits in a byte

8 bits in a byte

_________ is the most difficult, radical, lengthy, and comprehensive strategy. BPR BPS BPM BPI

BPR

Which of the following is NOT an example of alien software? Blockware Spyware Spamware Adware

Blockware

Which of the following is not in the business analytics domain? Predictive analytics Descriptive analytics Prescriptive analytics In-memory computing

In-memory computing

Which of the following is FALSE of QR codes? QR codes are more resistant to damage than bar codes. QR codes are larger than bar codes because they store information both horizontally and vertically. QR codes can store much more information than bar codes. QR codes can be read from any direction or angle.

QR codes are larger than bar codes because they store information both horizontally and vertically.

______ is the most popular query language used for interacting with a database. SQL TPS ETL RFID

SQL

________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks. Software-defined Backbone Personal area Cloud

Software-defined

Which of the following is not "unstructured data"? Image file Audio file Video file Spreadsheet

Spreadsheet

________ is the protocol of the Internet. TCP/IP Ethernet Fiber DSL

TCP/IP

________ is a cable medium. Satellite Microwave Twisted-pair Radio

Twisted-pair

_________ is a private network that uses a public network to connect users. DoS VPN RFID ERP

VPN

Which of the following is NOT a characteristic of Big Data? Volume Viscous Variety Velocity

Viscous

The Internet is a ________. MAN LAN WAN PAN

WAN

Which of the following is the correct order of networks from largest to smallest? MAN, WAN, PAN, LAN WAN, MAN, PAN, LAN WAN, MAN, LAN, PAN MAN, WAN, LAN, PAN

WAN, MAN, LAN, PAN

_________ is a communications control. A company gate Encryption RFID A firewall

a firewall

_________ refers to determining who is responsible for the actions that were taken. Liability Responsibility Accountability Answerability

accountability

_________ causes pop-up advertisements to appear on your screen. Spyware Marketware Spamware Adware

adware

In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission. affiliate marketing electronic tendering viral marketing online direct marketing

affiliate marketing

Each characteristic or quality of a particular entity is called a(n) ________. instance record attribute field

attribute

Bandwidth is stated in ________ per second. beeps bytes blips bits

bits

________ is a short-range wireless network. MiFi LTE Bluetooth WiMAX

bluetooth

_________ organizations have physical and online dimensions. Brick-and-mortar Virtual Pure-play Clicks-and-mortar

clicks-and-mortar

what is a foriegn key

column(s) that provide a link btw data in two tables

The _________ approach highlights the interlocking relationships that underlie all societies. rights common good utilitarian fairness

common good

Under the convention of business flowchart, __________, shape is used to represent questions? And ___________shape is used to represent actions? How many branches should be followed by a question? ___ (not a multiple choice question)

diamond, rectangle, 2

________ is a disadvantage of fiber-optic cable. Security Cost Bandwidth Difficult to work with

difficult to work with

The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. common good rights utilitarian fairness

fairness

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True False

false

The ________ creates links between two tables. primary alien secondary foreign

foreign

In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time. forward; higher reverse; lower forward; lower reverse; higher

forward; higher

________ is NOT an advantage of twisted-pair wire. Cost Easy to work with Availability High bandwidth

high bandwidth

________ is an advantage of coaxial cable. Easy to work with Cost Security High bandwidth

high bandwidth

A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. medium hot warm cold

hot

An order from a customer is a(n) __________ for a business process. output feedback input resource

input

Intellectual capital is another term for ________. data information wisdom knowledge

knowledge

________ is an example of pre-digital data storage that is comparable to a database. schedule of due dates on a project outline list of sales totals on a spreadsheet cash register receipt library card catalog

library card catalog

A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department. warehouse; mart mart; warehouse warehouse; store mart; store

mart;warehouse

________ transmission systems transmit data through electromagnetic waves. Satellite Microwave Radio Fiber

microwave

You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce. mobile local social electronic

mobile

Dashboards are used in which of the following processes? executing a process capturing and storing process data all of the above monitoring process performance

monitoring process performance

The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-out sign-up opt-in sign-out

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in sign-out sign-up opt-out

opt-out

The ________ key is an identifier field that uniquely identifies a record. foreign alien primary secondary

primary

_________ issues involve collecting, storing, and disseminating information about individuals. Accuracy Accessibility Property Privacy

privacy

In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. public; public private; private private; public public; private

public; private

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted. Radio Microwave Satellite Fiber

radio

Whereas phishing attacks are ____, denial of service attacks are ____. remote attacks requiring no user action; remote attacks requiring user action remote attacks requiring no user action; attacks by a programmer developing a system distributed remote attacks requiring user action; attacks by a programmer developing a system remote attacks requiring user action; remote attacks requiring no user action

remote attacks requiring user action; remote attacks requiring no user action

_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility

responsibility

Each relational database table contains records (listed in _______) and attributes (listed in ______) . columns; columns rows; columns columns; rows rows; rows

rows; columns

________ transmission systems can have a large coverage area but their signals experience propagation delay. Fiber Satellite Microwave Radio

satellite

_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Spamware Spyware Adware Marketware

spamware

Keystroke loggers and screen scrapers are examples of _________. adware spamware spyware marketware

spyware

_________ collects personal information about users without their consent. Spamware Spyware Marketware Adware

spyware

how do you count bits?

they start at 0 (0,1,2,3,4,5,6,7) so 8 bits is one byte

A foreign key is a primary key in another file. True False

true

Blacklisting is when everything can run except what is on the list. True False

true

According to the textbook, ________ is the most widely available cable medium. fiber-optic microwave radio twisted-pair

twisted-pair

The relational database model is based on the concept of ________-dimensional tables. four three two one

two

what is a primary key

usually the left most field unless it looks like it repeats

The _________ approach states that ethical action is the one that provides the most good or does the least harm. common good utilitarian rights fairness

utilitarian

The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. utilitarian rights fairness common good

utilitarian

In ________, recipients of your marketing notices send information about your product to their friends. affiliate marketing online direct marketing viral marketing electronic tendering

viral marketing

_________ organizations are only online. Brick-and-click Virtual Clicks-and-mortar Brick-and-mortar

virtual

An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks. threat; vulnerability; liability vulnerability; security; threat vulnerability; threat; exposure threat; vulnerability; exposure

vulnerability; threat; exposure

A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization. store warehouse mart shop

warehouse

_________ is an attack by a programmer developing a system. A phishing attack Virus DoS A Trojan horse

A Trojan horse

__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process. BPM BPS BPR BPI

BPI

Which of the following would be an example of a SCADA attack? *Social Security numbers are deleted from a company's database. *Email accounts are hacked and kinky messages are sent to all of the user's contacts *Bank accounts are hacked into after Internet purchases *Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.

Hackers would use a botnet to perform a _________. a Trojan horse virus DoS a logic bomb

DoS

_________ is a remote attack requiring no user action. A Trojan horse DoS Virus A logic bomb

DoS

________ cables are made of glass. Twisted-pair Microwave Coaxial Fiber-optic

Fiber-optic

Only a few ________ satellites are needed for global coverage. LEO GEO MEO VEO

GEO

________ defines how messages are formulated and how their receivers interpret them. SMTP TCP/IP HTTP DSL

HTTP

Which of the following is a property issue? How can we ensure that the information will be processed properly and presented accurately to users? How should we handle illegally copying copyrighted software? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? What information about oneself should an individual be required to reveal to others?

How should we handle illegally copying copyrighted software?

________ was developed because we have run out of IP addresses in the original IP addressing scheme. IPv2 IPv4 IPv8 IPv6

IPv6

______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others. Privacy Profiling Information privacy Digital dossier

Information privacy

A network that is restricted to a single building is a ________. PAN MAN LAN WAN

LAN

Satellite telephone services are provided through ________ satellites. VEO GEO MEO LEO

LEO

________ satellites are used to run the GPS system. LEO VEO GEO MEO

MEO

________ is a broadcast medium. Microwave Twisted-pair Fiber-optic Coaxial

Microwave

Which of the following is NOT a basic function of TCP/IP? Sequences the transfer of packets Responsible for disassembling, delivering, and reassembling data during transmission Manages the movement of data packets between computers by establishing a connection between the computers Acknowledges the packets have been transmitted

Responsible for disassembling, delivering, and reassembling data during transmission

Which of the following is the most prominent data manipulation language today? DB2 SQL Access NoSQL Crystal Reports

SQL

Careless Internet surfing is _________ and is an _________ mistake. a human error; intentional social engineering; intentional social engineering; unintentional a human error; unintentional

a human error; intentional

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. Property Accuracy Privacy Accessibility

accuracy

The IT infrastructure is ___________. all of the above put together the IT services the IT personnel the IT components

all of the above put together

Which of the following is an accurate representation of the data hierarchy from smallest to largest? bit, byte, field, record, file, database bit, byte, field, file, record, database byte, bit, field, record, file, database byte, bit, field, file, record, database

bit, byte, field, record, file, database

_________ organizations are purely physical. Clicks-and-mortar Virtual Pure-play Brick-and-mortar

brick-and-mortar

A ________ is a group of eight ________. bit; bytes byte; bits field; files file; fields

byte; bits

IT ___________be used to create a competitive advantage___________. cannot; because everyone has access to technology can; because everyone has access to technology cannot; even when it is used effectively can; when it is used effectively

can; when it is used effectively

________ cables are made of copper. Radio Coaxial Fiber-optic Microwave

coaxial

Which of the following is the correct order of the KMS cycle? capture, create, refine, store, disseminate, manage capture, create, refine, store, manage, disseminate create, capture, refine, store, disseminate, manage create, capture, refine, store, manage, disseminate

create, capture, refine, store, manage, disseminate

An/The ________ is a network of networks. intranet extranet externet Internet

internet

The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets. network interface transport Internet application

internet

The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-out Opt-in

opt-out

With ________, customers use the internet to self-configure products or services. group purchasing product customization electronic exchanges bartering online

product customization

Database systems minimize ________. security redundancy independence integrity

redundancy

In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time. reverse; lower forward; higher reverse; higher forward; lower

reverse; lower

The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. fairness utilitarian rights common good

rights

An electronic _________ is a website the represents a single store. mall auction storefront marketplace

storefront

What is the primary key???

the thing that will never be the same for each person (a phone number or student ID) sometimes there might be more than one thing that will always be different. The primary key is the one that will make the most sense to sort with. Ex. if student ID and phone number are there, it would probably be easier to make student ID the primary key

The ________ layer of TCP/IP provides communication and packet services. application Internet transport network interface

transport

_________ is a remote attack requiring user action. DoS A logic bomb Virus A Trojan horse

virus


Conjuntos de estudio relacionados

Specialised Cells, Tissues and Organs

View Set

Chapter 1 quiz: questions missed

View Set

Assignment 5 - Benefits of Insurance

View Set

COC 2020 - FINAL EXAM STUDY QUESTIONS (SET 3)

View Set

Chapters 2, 3, and 4 Intro to Business and Marketing

View Set