MIS Exam 2 Part 6-10

¡Supera tus tareas y exámenes ahora con Quizwiz!

An elastic load balancer is a feature available in a private cloud that is not available in internal information systems, built using Web services. True/False

True

Before the creation of personal computers, time-sharing vendors provided slices of computer time on a use-fee basis. True/False

True

Browser applications are thin-client applications that need not be preinstalled on the users' computers. True/False

True

Browser database application forms, reports, and queries are displayed and processed using HyperText Markup Language (HTML). True/False

True

Cloud computing architecture allows employees to use devices connected with IoT. True/False

True

Cloud computing can enable organizations to readily obtain elastic resources at very low costs. True/False

True

Cloud computing is likely to lead to an increase in the number of technology-based startups. True/False

True

Cloud resources are pooled because many different organizations use the same physical hardware. True/False

True

Content delivery networks (CDNs) are used to store and deliver content that rarely changes. True/False

True

Database management system (DBMS) administrative functions include adding structures to improve the performance of database applications. True/False

True

If software licensed from others is to be installed on the cloud, licenses that permit replication must be purchased. True/False

True

In single-user databases, the application, the database management system (DBMS), and the database all reside on a user's computer. True/False

True

In the future, there may be additional cloud services that go beyond IaaS, SaaS, and PaaS. True/False

True

Large Web farms are likely to replace in-house servers used by small companies due to the benefits of cloud computing. True/False

True

NoSQL database management system products are very technical and can be used only by those with a deep background in computer science. True/False

True

Organizations that are required by law to have physical control over their data can benefit from cloud computing using private clouds and virtual private clouds. True/False

True

Service oriented architecture (SOA) is a way of designing computer programs so that they can be combined flexibly. True/False

True

Structured query language statements can be issued directly to the database management system (DBMS) by an application program. True/False

True

The administrative functions of a database management system (DBMS) include backing up database data. True/False

True

Which of the following statements is TRUE of a virtual private cloud (VPC)? A) A VPC generally stores an organization's most sensitive data. B) A VPC does not make use of a virtual private network. C) A VPC can be accessed only from within an organization. D) A VPC can be built on a public cloud infrastructure.

A VPC can be built on a public cloud infrastructure

Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)? A) A VPC can be accessed over the Internet, while a VPN cannot be accessed over the Internet. B) A VPC uses encrypted connections between the users and its server, while a VPN does not use such secure connections. C) A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages. D) A VPC does not facilitate data storage, while a VPN allows the storage of a user's most important data.

A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages.

With ________ like Microsoft Access, the application, DBMS, and database all reside on the user's computer. A) a simple query applications B) a single user database C) a common database D) a spreadsheet

A single user database

If the structure of a list is simple, such as a list of student grades, the user should use ________. A) google docs B) a spreadsheet C) a database D) paper and pencil

A spreadsheet

Which of the following elements of a database application provides security, data consistency, and special-purpose processing? A) Forms B) Query applications C) Application programs D) Reports

Application programs

A ________ is an information system that stores user data in many different geographical locations and makes that data available on demand. A) content delivery network B) wide area network C) virtual private network D) local area network

Content delivery network

All of these are DBMS processes EXCEPT ________. A) assist in the administration of the database B) create tables and other database structures C) process the database D) create data

Create data

All of the following are elements of a database application EXCEPT ________. A) application programs B) reports C) data D) query applications

Data

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) metadata table C) dimension table D) database hierarchy

Database application

Which of the following is a nonrelational data store developed by Amazon.com? A) MongoDB B) Bigtable C) Dynamo D) Cassandra

Dynamo

A content delivery network (CDN) services a user's request using the geographically closest server. True/False

False

A small company is likely to choose infrastructure as a service (IaaS) as it does not require much technical expertise to load operating systems on a server. True/False

False

All traditional databases require the Internet to transmit traffic between a user's computer and a database management system (DBMS) server computer. True/False

False

An organization's internal information system that does not provide elasticity is still considered a cloud. True/False

False

As standard practice, customers are regularly updated by cloud vendors about the location and number of copies made of their data. True/False

False

Browser database applications are thick-client applications that need to be preinstalled on the users' computers. True/False

False

Cloud security is 100% security proof. True/False

False

Cloud vendors do not benefit from economies of scale. True/False

False

Cloud-based hosting is preferred by organizations that are required by law to have physical control over their data. True/False

False

Content delivery networks (CDNs) increase a Web page's load time. True/False

False

Database management system (DBMS) products are included in infrastructure as a service (IaaS). True/False

False

Databases can not be used in a browser. True/False

False

In most cases, a traditional database is only used by one person. True/False

False

Microsoft Access does not have a graphical query interface. True/False

False

New products such as NoSQL databases will replace the relational model. True/False

False

Permissions have to be general when administering a database. True/False

False

Queries in database applications present data in a structured manner using operations such as sorting, grouping, and filtering. True/False

False

Remote action systems increase time and travel expenses. True/False

False

Reports in database applications provide security, data consistency, and special-purpose processing. True/False

False

SQL statements can only be issued behind the scenes. True/False

False

Security requirements are more stringent for traditional applications than for browser-based ones. True/False

False

Software as a system is a fundamental cloud type. True/False

False

Teleaction increases the value of local mediocrity. True/False

False

Telediagnosis uses telecommunications to link surgeons to robotic equipment at distant locations. True/False

False

The lost-update problem caused by multi-user processing in databases can be prevented by avoiding all types of database locking. True/False

False

To use cloud-based hosting, an organization will have to construct its own data center. True/False

False

Which of the following elements of a database application helps in the insertion of new data and the deletion of existing data? A) queries B) application programs C) forms D) reports

Forms

________ are browser based queries that are created when a user clicks on a graphic. A) Application programs B) User reports C) Databases D) Graphical queries

Graphical queries

Which of the following statements is TRUE of private clouds? A) Several organizations pool their resources to form a private cloud. B) Private clouds are easy to build and operate. C) Private clouds provide access from outside an organization that it created without requiring a person to connect to a virtual private network. D) Idle servers in a private cloud cannot be repurposed for use by other organizations.

Idle servers in a private cloud cannot be repurposed for use by other organizations.

________ databases process databases in main memory. A) Relational B) NewSQL C) In-memory D) NoSQL

In-memory

Which of the following is an advantage of a private cloud in an organization? A) It eliminates the need to use an additional secure network to access this cloud from outside the organization. B) It reduces the complexity involved in using other publicly available cloud services. C) It allows the organization to repurpose its idle servers for use to other organizations. D) It allows the organization to manage its servers with elastic load balancing.

It allows the organization to manage its servers with elastic load balancing.

Which of the following is an advantage of in-house hosting? A) It requires very small capital. B) It has the ability to adapt to growing or fluctuating demands. C) It gives greater control over the location of data. D) It eliminates the risk of obsolescence.

It gives greater control over the location of data.

Which of the following statements is TRUE of cloud-based hosting? A) It makes scaling up to meet the demands of increased traffic difficult. B) It gives little visibility over the security being used to protect data. C) It involves the risk of investing in technology that may soon become obsolete. D) It gives greater control over physical location of data.

It gives little visibility over the security being used to protect data.

Which of the following is an advantage of a virtual private network (VPN)? A) It helps to securely access information over the public Internet. B) It does not depend on the Internet to function effectively. C) It can be used to physically connect a client and the server. D) It facilitates easy access to an organization's data without requiring security access.

It helps to securely access information over the public internet

What is a virtual private network? A) It is a connection that uses the Internet to create secure point-to-point connections. B) It is a markup language that fixes several HyperText Markup Language (HTML) deficiencies and is commonly used for program-to-program interaction over the Web. C) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. D) It is the most common language for defining the structure and layout of Web pages.

It is a connection that uses the Internet to create secure point-to-point connections.

In the context of the cloud, which of the following best describes the term elastic? A) It means that the computing resources leased can be increased or decreased dynamically in cloud-based hosting. B) It means that the customers are provided a consistent bandwidth on the cloud. C) It means that the operations staff manually allots fresh resources when the traffic increases. D) It means that the resources available for cloud-hosting are shared among customers.

It means that the computing resources leased can be increased or decreased dynamically in cloud-based hosting.

Which of the following is TRUE of a virtual private network (VPN)? A) It does not encrypt messages. B) It can be used to store highly sensitive information of an organization. C) It provides a secure connection for information transmitted over the public Internet. D) It is limited to organizational use.

It provides a secure connection for information transmitted over the public internet.

Which of the following is an advantage of a content delivery network? A) It increases the load on the original server. B) It increases the reliability by storing the data on a single, large server. C) It increases the load time of Web pages for the users. D) It provides protection from denial-of-service (DOS) attacks.

It provides protection from denial-of-service (DOS) attacks.

Which of the following is TRUE of the relational database processing model? A) It represents relationships with the help of foreign keys. B) It supports very high transaction rates. C) It can efficiently store files with large collections of bits. D) It helps organizations store new data types such as images, audio, and videos.

It represents relationships with the help of foreign keys

Which of the following is a drawback of the relational database processing model? A) It utilized an extensive amount of storage space. B) It required powerful processors to function. C) It did not enable document piece-making via normalization. D) It was never a natural fit with business documents.

It was never a natural fit with business documents

Which of the following is a major drawback of multi-user processing of a database? A) software redundancy B) lost-update problem C) limited access to data D)lack of data integrity

Lost-update problem

Until about the late 1980s, organizations primarily used ________ for their internal data processing needs? A) client-servers B) mainframes C) the cloud D) scalable computers

Mainframes

Which of the following is an open source document-oriented NoSQL DBMS product? A) MongoDB B) Access C) SQL Server D) DB2

MongoDB

________ refers to software products that support very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud. A) Relational DBMS B) Traditional DBMS C) NoSQL DBMS D) MySQL DBMS

NoSQL DBMS

All of the following are examples of SaaS EXCEPT ________. A) Office 365 B) Salesforce.com C) Google Mail D) Outlook on the PC

Outlook on the PC

An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS). This allows customers to add their own applications to the hosted services. Which of the following cloud-based offerings is being provided to the users? A) platform as a service (PaaS) B) infrastructure as a service (IaaS) C) unified communications as a service (UCaaS) D) software as a service (SaaS)

Platform as a service (PaaS)

Sireus Corp. has availed a cloud-based service. As this service provides hardware and operating systems, Sireus Corp. can easily install its software on this cloud product. Which of the following services has the company availed from its cloud vendor? A) unified communications as a service (UCaaS) B) software as a service (SaaS) C) platform as a service (PaaS) D) infrastructure as a service (IaaS)

Platform as a service (PaaS)

A virtual private network uses the Internet to create the appearance of private, secure connections. True/False

True

A(n) ________ is an information system (IS) that provides computer-based activity at a distance. A) content delivery network B) remote action system C) indexing service system D) transport driver interface

Remote action system

Which of the following elements of a database application presents data in a structured manner using sorting, grouping, filtering, and other operations? A) forms B) queries C) application programs D) reports

Reports

A company decides to run advertising during the NCAA Final Four tournament. They are not sure how traffic their website will get so they decide to lease what they think they need and can easily add more if necessary. This is called ________. A) resource elasticity B) client-server architecture C) mainframe usage D) pooled resources

Resource elasticity

Phobas Inc. offers an online service that stores notes made by customers on the cloud. When a customer enters notes on a device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings does Phobas Inc. provide to its customers? A) platform as a service (PaaS) B) software as a service (SaaS) C) unified communications as a service (UCaaS) D) infrastructure as a service (IaaS)

Software as a service (SaaS)

One of the reasons for the appearance of new styles of nonrelational database processing is the need for ________. A) limiting the use of open-source document-oriented DBMS B) gaining faster performance by limiting the number of servers used C) storing data types such as images, audio, and videos in organizations D) breaking up sales orders via normalization

Storing data types such as images, audio, and videos in organizations

A remote system designed by Alpha Solutions uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________. A) telelaw enforcement B) teleassessment C) teleinstruction D) telediagnosis

Telelaw enforcement

Which of the following statements best defines the cloud? A) The cloud is the network of servers hosted in-house by an organization for its own requirements. B) The cloud is the elastic leasing of pooled computer resources over the Internet. C) The cloud is a peer-to-peer network used to share data between users. D) The cloud is the elastic leasing of in-house computer hardware.

The cloud is the elastic leasing of pooled computer resources over the Internet.

Which of the following is likely to be a consequence of cloud computing in the future? A) The cost of obtaining elastic resources will decrease. B) The preference to set up one's own computing infrastructure will increase among organizations. C) The demand for employees who know how to use and manage information systems will reduce. D) The number of technology-based startups will stagnate.

The cost of obtaining elastic resources will decrease

Which of the following is a reason for an internal information system that uses Web services to not be considered a cloud? A) The number of servers is fixed and is not made elastic. B) Web service standards are not followed, as they are confined within the limits of a company. C) Idle servers are dynamically reallocated. D) Data transfer is enabled without dependency on the Internet.

The number of severs is fixed and not made elastic

Which of the following is TRUE of browser-based database applications? A) The application, database management system (DBMS), and the database reside on the user's computer. B) They are displayed and processed using html, html5, or css3. C) They are written in object-oriented languages such as Structured Query Language. D) They use C++ as the standard language for user-side processing.

They are displayed and processed using html5 or css3

Which of the following statements is TRUE of Web services? A) They are programs that comply with IEEE 802.3 protocol standard. B) They are designed in such a way that they cannot be flexibly combined with other programs. C) They are programs that comply with Web service standards and can only run as an independent program. D) They are programs designed using the concept of service-oriented architecture.

They are programs designed using the concept of service-oriented architecture.

Which of the following statements is TRUE of content delivery networks (CDNs)? A) They reduce access costs by delivering data faster. B) They use geographic proximity as the factor to decide which server should deliver a requested content. C) They use predetermined servers to deliver content to each location irrespective of traffic changes. D) They distribute data on different servers without any data replication.

They reduce access costs by delivering data faster.

A content delivery network (CDN) provides a specialized type of platform as a service (PaaS). True/False

True

A database application serves as an intermediary between users and database data. True/False

True

A routing server determines which content delivery network (CDN) server should respond to a request in real time. True/False

True

A task for the DBA during the development phase of the database is to validate the data model. True/False

True

A tunnel is a virtual, private pathway over a public or shared network from the virtual private network (VPN) client to the VPN server. True/False

True

A user can receive various pieces of a Web page from different servers on a content delivery network (CDN). True/False

True

A vendor providing software as a service (SaaS) usually makes the software available as a thin-client. True/False

True

A virtual private cloud allows organizations to gain the advantages of cloud storage for the portion of data that need not be physically controlled. True/False

True

A virtual private network (VPN) uses encryption and decryption to protect VPN communications from snooping. True/False

True

The database management system (DBMS) can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. True/False

True

To use software as a service (SaaS), a user has to just sign up for the service and learn how to use it. True/False

True

Traditional database application programs are written in object-oriented languages such as C++. True/False

True

Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)? A) Unlike a VPC, a private cloud can be created and used without the Internet. B) Unlike a VPC, the infrastructure required for a private cloud can be built and operated easily. C) Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data. D) Unlike a VPC, a private cloud can be built on top of a public cloud infrastructure.

Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data.

The conversion of the existing traditional databases in organizations to NoSQL databases is ________. A) unnecessary when relational databases meet the needs of organizations B) highly efficient and is being practiced by many organizations C) highly recommended because it is user friendly D) very cost-effective but can be enormously disruptive

Unnecessary when relational databases meet the needs of organizations

Benefits of using the cloud include all of the following EXCEPT ________. A) use of dumb terminals B) used over the internet C) pooled computer resources D) elastic

Use of dumb terminals

Traditional database application programs are written in object-oriented languages like ________. A) Datalog B) Visual Basic C) Unigraphics D) Pascal

Visual Basic

Browser-based database applications differ from traditional applications in that they ________. A) fail to support graphical queries B) are usually open to the public C) have no security requirements D) are used only by corporates

are usually open to the public

An organization that hires cloud services ________. A) is allowed to change its computer hardware requirements only once in an hour B) is given access only to a single server C) can limit the response time of its Web pages D) can accommodate an increase in traffic from only one city

can limit the response time of its Web pages

A cylindrical symbol labeled "database" represents ________ because databases are stored on disks. A) a drum of data B) dataflow C) dataspace D) a computer disk drive

computer disk drive

Organizations can dynamically reuse servers that use Web services internally by ________. A) creating a private cloud B) making the servers elastic C) allocating different servers for different services D) replicating the servers

creating a private cloud

Lists that involve data with multiple themes require a ________. A) file B) field C) database D) spreadsheet

database

Which of the following factors has contributed to an increase in the popularity of cloud hosting? A) development of virtualization technology that allows near-instantaneous creation of new virtual machines B) increase in the cost of processors, data communication, and data storage C) demand for services that can run without the support of the Internet D) development of Web services that can be accessed without meeting the service-oriented architecture specifications

development of virtualization technology that allows near-instantaneous creation of new virtual machines

Cloud vendors benefit from ________ because the average cost of production decreases as the size of the operation increases. A) using Apple's web farm B) economies of scale C) the Internet D) using their own computers

economies of scale

The A in ACIS means Atomic and means ________. A) a transaction never goes away B) processed alone C) either all of none of the transactions in the database are processed D) all of the transactions are processed the same way

either all of none of the transactions in the database are processed

The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________. A) network functions virtualization (NFV) B) application virtualization C) infrastructure as a service (IaaS) D) platform as a service (PaaS)

infrastructure as a service (IaaS)

Relational databases have been the standard way of processing databases for over 30 years because ________. A) of the ability to have multiple primary keys B) of gaining faster performance by number of servers used C) improved storage capabilities D)of fixed sized tables

of fixed sized tables

An internal information system built using Web services is said to be using the cloud if it ________. A) uses the Intranet B) allocates specific servers to each task C) provides platform as a service (PaaS) D) offers elasticity in the usage of servers

offers elasticity in the usage of severs

Amazon Redshift offers ________. A) MySQL database B) petabyte-scale data warehouse C) NoSQL database service D) a relational database service

petabyte-scale data warehouse

Using a VPC, an organization can store its ________. A) public documents B) private documents C) most sensitive data D) all documents

private documents

If an organization opts for software as a service (SaaS), it will have to ________. A) transfer data and develop procedures B) purchase licenses for software replication C) install an operating system on the server D) install a database management system

transfer data and develop procedures


Conjuntos de estudio relacionados

Acct. chapter 5 practice questions

View Set

Chapter 3: The Manager's Changing Work Environment and Ethical Responsibilities: Doing the Right Thing

View Set

PHARM - Integumentary Medications

View Set

70-740 ExamRef-12 TB, 70-740 ExamRef-13 TB, 70-740 ExamRef-11 TB, 70-740 ExamRef-14 TB, 70-740 ExamRef-15 TB

View Set

Group Life Insurance - Chapter 6

View Set

Chapter 12 spirituality Health Assessment

View Set