MIS EXAM 2

qFua5z

Which of the following refers to a set of loosely coupled software components that exchange information with each other using standard web communication standards and languages? A.web services B.EAI software C.SOA D.SOAP E.SaaS

A

Which of the following became the standard PC in the Personal Computer Era? A.Wintel PC B.Unix PC C.MITS PC D.Altair E.Apple Macintosh

A.Wintel PC

Which of the following pulls content from websites and feeds it automatically to users' computers? Select one: A.FTP B.RSS C.HTTP D.Bluetooth E.IPv6

B.RSS

A type of IT infrastructure service that stores and manages corporate data and provides capabilities for analyzing the data

Data management

Which of the following is a worm that uses flaws in Windows software to take over a computer remotely? Select one: A.Sasser B.Zeus C.Cryptolocker D.ILOVEYOU E.Conficker

E.Conficker

Enterprise database management software is used to manage the software applications used in business activities. True False

False

In financial services firms, investments in IT infrastructure represent more than half of all capital investment. True False

True

Virtualization

Virtualization allows organizations to optimize their use of resources in new ways, and also to take advantage of spare computing power by allowing a single resource to act as multiple resources.

A network that covers entire geographical regions

Wide-area Network (WAN)

An operating system used by nearly 88% of PCs

Windows operating system

A security hole in software that is unknown to the software creator at the time of discovery

Zero-day Vulnerability

Database

a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data.

A distributed computing model where clients are linked to one another through a network controlled by a server

client/server computing

Networking/Telecommunications

consisting of both physical devices and software, links the various pieces of hardware and transfers data from one physical location to another •Network operating systems -Windows Server, Linux, Unix •Telecommunication services -Telecommunications, cable, telephone company charges for voice lines and Internet access -A T&T, Verizon

Client/Server Computing

drastic increase in computing power and applications throughout the firm. Prior to small, less expensive server computers, computing power had to purchased in large blocks at great expense. With client/server computing, you can grow your firm's inventory of computers gradually, over time, to meet current demand. - desktops or laptop computers called clients are networked to powerful server computers that provide the client computers with a variety of services and capabilities

Green Computing

involves reducing the electricity consumed and environmental waste generated when using a computer -Practices and technologies for manufacturing, using, disposing of computing and networking hardware -Reducing power consumption a high priority -Green data centers

Cloud Computing

refers to a model of computing that provides access to a shared pool of computing resources (computers, storage, applications, and service) over the network, often the Internet fastest growing form of computing

Data Management & Storage

responsible for organizing and managing the firm's data so that they can be efficiently accessed and used leading platforms are Oracle, Microsoft

Web Server

will serve a web page to a client in response to a request for service

IT Infrastructure

•Set of physical devices and software required to operate an enterprise - •Set of firm-wide services including: -Computing platforms providing computing services -Physical facilities management services -I T management, education, and other services Amazon is routinely cited as the most popular online shopping site and receives high praise from customers for the quality of its service and speed of execution. There is a reason for this: Amazon has one of the world's largest and well-designed computing infrastructures to provide these services

Which one of the following statements is not true? Select one: A.The Internet backbone is owned entirely by the federal government in the United States. B.ICANN manages the domain name system. C.The IAB establishes the overall structure of the Internet. D.The Internet must conform to laws of the nation-states in which it operates. E.W3C determines programming standards for the Internet.

A.The Internet backbone is owned entirely by the federal government in the United States.

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic? Select one: A.War driving B.Sniffing C.Cybervandalism D.Drive-by tapping E.Snooping

A.War driving

Digital subscriber lines: Select one: A.operate over existing telephone lines to carry voice, data, and video. B.operate over coaxial cable lines to deliver Internet access. C.are very-high-speed data lines typically leased from long-distance telephone companies. D.have up to twenty-four 64-Kbps channels. E.are assigned to every computer on the Internet.

A.operate over existing telephone lines to carry voice, data, and video.

A protocol used by web browser software to request web pages from the internet

Hypertext transfer protocol (HTTP) or secure hypertext transfer protocol

Database Management System (DBMS)

is software that enables an organization to centralize data manage them effiencetly and provide access to the stored data by application programs -Interfaces between applications and physical data files -Separates logical and physical views of data -Solves problems of traditional file environment §Controls redundancy §Eliminates inconsistency §Uncouples programs and data §Enables organization to centrally manage data and data security

To dynamically show data

is to create a pivot table

A physical view shows data as it is actually organized and structured on the data storage media. Select one: True False

true

An unnormalized relation contains repeating groups. Select one: True False

true

Apple Pay uses an RFID-related technology called near field communication. Select one: True False

true

Relational Database Management System (RDBMS)

A type of database system in which data is stored in tables related by common fields; the most widely used database model today. •Represent data as two-dimensional tables •Each table contains data on entity and attributes •Table: grid of columns and rows -Rows (tuples): Records for different entities -Fields (columns): Represents attribute for entity -Key field: Field used to uniquely identify each record -Primary key: Field in table used for key fields -Foreign key: Primary key used in second table as look-up field to identify records from original table

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: Select one: A.phishing. B.tapping. C.theft and fraud. D.radiation. E.message alteration.

A.phishing.

The Gramm-Leach-Bliley Act: Select one: A.requires financial institutions to ensure the security of customer data. B.specifies best practices in information systems security and control. C.imposes responsibility on companies and management to safeguard the accuracy of financial information. D.outlines medical security and privacy rules. E.identifies computer abuse as a crime and defines abusive activities. Feedback

A.requires financial institutions to ensure the security of customer data.

A(n) ________ is software for locating and managing stored web pages. Select one: A.web server B.net server C.router D.modem E.hub

A.web server

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A.5, 2, 3, 4, 1 B.5, 4, 2, 3, 1 C.4, 5, 2, 3, 1 D.5, 4, 2, 1, 3 E.4, 5, 3, 2, 1

B.5, 4, 2, 3, 1

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? Select one: A.Program-data dependence B.Lack of flexibility C.Poor security D.Lack of data sharing E.Data redundancy

B.Lack of flexibility

Which of the following is the single greatest cause of network security breaches? Select one: A.Viruses B.User lack of knowledge C.Trojan horses D.Cyberwarfare E.Bugs

B.User lack of knowledge

An approach to data processing focuses on the 3Vs: extreme volume of data, a wide variety of data types and sources, and the velocity at which data must be processed

Big data

A distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority

Blockchain

Which of the following focuses primarily on the technical issues of keeping systems up and running? Select one: A.Business continuity planning B.Security policies C.Disaster recovery planning D.An AUP E.An information systems audit

C.Disaster recovery planning

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A.TCP/IP B.COBOL C.Ethernet D.ASCII E.Linux

C.Ethernet

Which organization manages the domain name system of the Internet? Select one: A.None (no one "owns" the Internet) B.W3C C.ICANN D.The Department of Commerce (U.S.) E.IAB

C.ICANN

Which of the following statements about Linux is not true? A.Linux can be used as an operating system for mainframe computers. B.It is available in free versions downloadable from the Internet. C.Linux is the leading operating system for desktop systems. D.Linux applications are embedded in cell phones, smartphones, tablet computers. and consumer electronics. E.Linux works on all the major hardware platforms.

C.Linux is the leading operating system for desktop systems.

Which of the following refers to a set of self-contained services that communicate with each other to create a working software application? A.web services B.EAI software C.SOA D.SOAP E.SaaS

C.SOA

Which of the following is the most recent specification of the security standard developed for Wi-Fi? Select one: A.WEP B.802.11i C.WPA3 D.S-HTTP E.TLS

C.WPA3

Bandwidth is the: Select one: A.number of frequencies that can be broadcast through a medium. B.number of cycles per second that can be sent through a medium. C.difference between the highest and lowest frequencies that can be accommodated on a single channel. D.total number of bytes that can be sent through a medium per second. E.geographical distance spanned by a network.

C.difference between the highest and lowest frequencies that can be accommodated on a single channel.

A field identified in a record as holding the unique identifier for a record is called the: Select one: A.identifier key. B.key field. C.primary field. D.unique ID. E.key attribute.

C.primary field.

A model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over a network

Cloud computing

Microsoft SQL Server is a(n): Select one: A.DBMS for both desktops and mobile devices. B.Internet DBMS. C.desktop relational DBMS. D.DBMS for midrange computers. E.DBMS for mobile devices.

D.DBMS for midrange computers.

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A.Data normalization B.Data accuracy C.Data redundancy D.Data inconsistency E.Data duplication

D.Data inconsistency

Which of the following is a grouping of characters into a word, a group of words, or a complete number? Select one: A.File B.Table C.Entity D.Field E.Tuple

D.Field

Which of the following statements is not true about search engines? Select one: A.They are arguably the "killer app" of the Internet era. B.They attempt to solve the problem of finding useful information on the web nearly instantly. C.They have become major advertising platforms and shopping tools. D.There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. E.Users are increasingly using search engines on mobile devices.

D.There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

When a hacker discovers a security hole in software that is unknown to the software's creator, it is an example of: Select one: A.sniffing. B.social engineering. C.phishing. D.a zero-day vulnerability. E.snooping.

D.a zero-day vulnerability.

The Windows operating system: A.was an early PC operating system. B.is used on virtually all tablet and mobile devices today. C.is a data management application used on PCs. D.is an operating system used by nearly 88 percent of PCs. E.is a web-based operating system for the Internet era.

D.is an operating system used by nearly 88 percent of PCs.

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A.service-oriented architecture. B.on-demand architecture. C.multitiered client/server architecture. D.two-tiered client/server architecture. E.divided architecture.

D.two-tiered client/server architecture.

A network that covers entire geographical regions is most commonly referred to as a(n): Select one: A.local area network. B.intranet. C.peer-to-peer network. D.wide area network. E.metropolitan area network.

D.wide area network.

A condition in a database in which the same data are duplicated in multiple parts of the database

Data redundancy

In data mining, which of the following involves using a series of existing values to determine what other future values will be? Select one: A.Associations B.Sequences C.Classifications D.Clustering E.Forecasting

E.Forecasting

Which of the following statements about mobile devices is not true? A.The introduction of mobile computing devices changed the computer platform dramatically. B.Mobile devices consume less power than computers. C.Mobile devices are not required to perform as many tasks as computers. D.Mobile devices generate less heat than computers. E.Qualcomm has a monopoly on manufacture of processers for mobile devices. Feedback

E.Qualcomm has a monopoly on manufacture of processers for mobile devices. Feedback

Which of the following is not one of the characteristics of cloud computing, as defined by the U.S. National Institute of Standards and Technology? A.Ubiquitous network access B.Location-independent resource pooling C.On-demand self service D.Measured service E.Reduced elasticity

E.Reduced elasticity

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A.Supply and demand B.Return on investment C.Breakeven point D.Cost-benefit analysis E.Total cost of ownership Feedback

E.Total cost of ownership Feedback

________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. Select one: A.Wireless networks B.Intranets C.Virtual private networks D.Modems E.Unified communications

E.Unified communications

Which of the following is not a technology driver transforming IT infrastructure? A.Network economics B.Law of Mass Digital Storage C.Moore's Law D.Declining communications costs and exponential growth in the size of the Internet E.Widespread rejection of technology standards

E.Widespread rejection of technology standards

Data cleansing not only corrects errors but also: Select one: A.establishes logical relationships between data. B.structures data. C.normalizes data. D.removes duplicate data. E.enforces consistency among different sets of data that originated in a separate information system.

E.enforces consistency among different sets of data that originated in a separate information system.

A method of optimizing cloud computing systems by performing some data processing on a set of linked servers at the edge of a network

Edge computing

Edge Computing

Edge computing is needed to provide efficient service to consumers located across the country. It works by reducing the distance between local computers and web resources and sharing the total load across many regional computing facilities. -Servers at the edge of the network, near the source of the data -Reduces latency and network traffic

Operating Systems

Emphasize Microsoft's traditional dominance in PC operating systems (Windows) and productivity software (Office) and explain that it is the most important reason for their success to date. manages all the application programs

Enterprise software applications

Enterprise application providers: SAP and Oracle. Middleware providers: IBM, Oracle. is computer software used to satisfy the needs of an organization rather than individual users

IT infrastructure consists of only those physical computing devices and software required to operate the enterprise. True False

False

Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine. True False

False

S-HTTP is a protocol used to establish a secure connection between two computers. True False

False

A technology (either hardware or software) that allows an organization to prevent unauthorized communication into and out of its network

Firewall

A set of practices and technologies to minimize the environmental effects of manufacturing and managing computing devices

Green computing

Internet Platforms

Hardware, software, management services to support company Web sites (including Web-hosting services), intranets, extranets. Internet hardware server market: IBM, Dell, Sun (Oracle), HP. Web development tools/suites: Microsoft (Visual Studio and .NET), Oracle-Sun (Java), Adobe, Real Networks.

A page description language for specifying how text, graphics, video, and sound are placed on a web page and for creating dynamic links to other web pages and objects

Hypertext markup language (HTML)

The notion that computer power doubles bout every 18 months

Moore's law

A standard set of rules and procedures for control of communications in a network

Network protocol Ex: HTTPS/ HTTP

A database management system that uses a flexible data model and is designed for managing large data sets across many distributed machines

Non relational database management system EX: graph databases, blockchain

A type of software created and updated by a worldwide community of programmers and available for free

Open source software Ex firefox, linxe

The practice of contracting custom software development to an outside firm

Outsourcing

The practice of slicing digital messages into parcels transmitting them along different communication paths and resembling them at their destinations

Packet switching

Open-Source Software

Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.

A computing model that uses the principle of quantum physics to represent data and perform operations on these data

Quantum computing

Malware that hijacks a user's computer and demands payment in return for giving back access

Ransomware

A type of database system that represents data as two-dimensional tables

Relational database management systems (RDBMS)

Tricking people into prevailing their passwords or other valuable information by pretending to be legitimate users or members of a company in need of information

Social engineering

Consultants and System Integrators

Software integration means ensuring the new infrastructure works with the firm's older, so-called legacy systems and ensuring the new elements of the infrastructure work with one another

A model that can be used to analyaxe direct and indirect costs to help dirms determine the actual cost of specific technology implemenatations

Total cost of ownership (TCO)

The internet is based on this networking protocol suite

Transmission Control Protocol/Internet Protocol (TCP/IP)

Ruby is an object-oriented programming language known for speed and ease of use in building web applications. True False

True

An authentication system in which a user must provide two types of identification such as a bank card and PIN

Two-factor authentication

A web address that combine a protocol prefix, a domain name, a directory path, and a document name

Uniform resource locator (URL) First part is http:// then www.eckerd.edu and then folder/filde.http

Moore's Law

Variants of Moore's Law include: the number of transistors on a chip doubles ever 18 months; computing power doubles every 18 months; and the price of computing falls by half every 18 months. Explain to students that even now, this trend continues but has slowed to around 2 years, with transistors today about 14 nanomenters (billionths of a meter) in size. computing power doubles every 2 years

A secure, encrypted, private network that has been configured within a public network to take advantage of economies of scale and management facilities of large networks, such as the internet

Virtual private network (VPM)

A method of computing that enables a single physical resource to appear as multiple logical resource

Virtualization

HTML5 makes it easier for web pages to function across different display devices. True False

true

Middleware is an application that transfers information from an organization's internal database to a web server for delivery to a user as part of a web page. Select one: True False

true

The Mirai botnet infected numerous IoT devices and then used them to launch a DDoS attack True False

true

Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace. True False

true

Web hosting services maintain a large web server, or series of servers. and provide fee-paying subscribers with space to maintain their websites. True False

true

Hardware

•The mobile digital platform -Smartphones -Tablet computers -Digital e-book readers and apps (Kindle) -Wearable devices •Consumerization of I T and B Y O D (bring your own device) -Forces businesses and I T departments to rethink how I T equipment and services are acquired and managed


zV0ZPl

Economic Development of Latin America Midterm 1

View Set

Chapter 19 Postoperative Nursing Management PrepU

View Set

Chapter 33-- Life During the Cold War

View Set

Chapter 2: Research Questions, Hypotheses, and Clinical Questions

View Set

NU144- Chapter 39: Assessment of Musculoskeletal Function

View Set

Chapter 1: Nurse's Role in Health Assessment: Collecting and Analyzing Data (Review Questions)

View Set