MIS Ch 5-8 T/F

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. Smartphones have the same security flaws as other Internet-connected devices.

True

1. Telephone networks are fundamentally different from computer networks

True

1. Web mining is the discovery of useful patterns on the Web.

True

10. A computer language translation program is an example of system software

True

10. Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms

True

11. Hypertext markup language specifies how text, graphics, video, and sound are placed on a document

True

11. In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog

True

11. OLAP is a key tool of BI

True

12. Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

12. Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.

True

13. A foreign key is a field that links to a separate table

True

13. Fiber-optic cable is more expensive and harder to install than wire media.

True

13. Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

True

14. Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

True

14. In-memory computing relies on a computer's main memory for storing data

True

15. The Domain Name System (DNS) converts domain names to IP addresses

True

15. The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture

True

16. Common Gateway Interface is a specification for processing data on a Web server.

True

16. NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs

True

16. VoIP technology delivers voice information in digital form using packet switching

True

17. SSL is a protocol used to establish a secure connection between two computers

True

17. Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information

True

18. A firm's information policy lays out who is responsible for updating and maintaining the information in a database system

True

18. In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks

True

18. Public key encryption uses two keys

True

18. Total cost of ownership components include costs for downtime, training, and support

True

2. In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.

True

2. Increasingly, voice, video, and data communications are all based on Internet technology

True

20. Data cleansing is the same process as data scrubbing.

True

20. Software localization refers to the entire process of converting software to operate in a second language

True

3. Every record in a file should contain at least one key field

True

3. Systems integration means ensuring the legacy systems work with new elements of the infrastructure

True

3. To create a computer network, you must have at least two computers

True

3. Viruses can be spread through e-mail.

True

4. Both Oracle and Microsoft Access use SQL to retrieve information from the database

True

5. DBMS simplify how end users work with databases by separating the logical and physical views of the data

True

5. To secure mobile devices, a company will need to implement special mobile device management software.

True

52. A DBMS is special software for creating, storing, organizing, and accessing data from a database

True

52. A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.

True

52. Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.

True

53. A physical view shows data as it is organized on the storage media

True

53. A software package for a mainframe usually requires a programmer to install it.

True

54. End users use a data manipulation language to manipulate data in the database.

True

54. Web browsers are the primary interface for accessing the Internet

True

55. Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.

True

55. XML provides a standard format for data exchange, enabling Web services to pass data from one process to another.

True

57. A walkthrough is a type of software testing used before software is even written

True

57. The trunk lines of the Internet are typically owned by network service providers

True

58. When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging

True

59. Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource

True

6. In a client/server network, a network server provides every connected client with an address so it can be found by others on the network

True

6. Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

True

7. Computer worms spread much more rapidly than computer viruses

True

7. Hadoop can process large quantities of any type of data, including video and Twitter feeds

True

8. In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly altered to meet demand.

True

8. One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender

True

9. A data warehouse may include information from legacy systems

True

9. A private cloud is operated by a single organization but may be managed by a third party and be located off premises

True

9. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

True

1. IT infrastructure technology is the set of physical devices required to operate the entire enterprise

False

10. A data warehouse is typically comprised of several smaller data marts

False

10. DoS attacks are used to destroy information and access restricted areas of a company's information system.

False

11. The distributed nature of cloud computing makes it somewhat easier to track unauthorized access

False

12. HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages

False

12. OLAP is used to find hidden patterns and relationships in large databases, and infer rules from these to infer future behavior

False

13. An acceptable use policy defines the acceptable level of access to information assets for different users

False

14. The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes

False

14. XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data

False

15. Implementing a Web interface for a database requires changes to the database itself

False

15. Packet filtering catches most types of network attacks.

False

16. SaaS providers deliver and provide Web-based, remote access to storage

False

17. Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support

False

17. In linking databases to the Web, the role of the application server is to host the DBMS

False

19. One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware

False

19. Over 70 percent of malware today is aimed at small businesses

False

19. TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer

False

19. The use of different terms for identifying data in a firm's various information systems is an example of redundant data

False

2. A grouping of characters into a word, a group of words, or a complete number is called a record

False

2. Today, most system and application software is custom built by in-house programmers.

False

20. RFID technology is being gradually replaced by less costly technologies such as WSNs

False

20. Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.

False

4. A mainframe is a type of legacy workstation

False

4. An NOS must reside on a dedicated server computer in order to manage a network

False

4. The term cracker is used to identify a hacker whose specialty is breaking open security systems

False

5. A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network

False

5. Client/server computing is the most widely used form of centralized processing

False

52. Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

54. An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits

False

56. An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic

False

56. An SaaS provider maintains a large Web server, or series of servers, and provides fee-paying subscribers with space to maintain their Web sites

False

56. Authorization refers to the ability to know that a person is who he or she claims to be

False

58. A Web server is a dedicated computer that delivers Web pages to client computers

False

58. An information policy specifies the procedures and rules for defining the structure and content of corporate databases.

False

6. Application server software is responsible for locating and managing stored Web pages

False

6. Most back-end databases are able to interpret HTML commands

False

7. Central large mainframe computing has largely replaced client/server computing

False

7. Using an online storage service such as DropBox is a type of virtualization

False

8. Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

False

8. The two key services of Hadoop are HDFS and in-memory computing.

False

9. Mobile search makes up approximately 10% of all Internet searches

False


Conjuntos de estudio relacionados

psyc108 chapter quizzes review for exam 1 (1,2,3,14)

View Set

Chapter Exam - Life Underwriting

View Set

Computer organization and design

View Set