MIS Test 2
spreadsheets
*stores data from experiment* can serve the same function as charts; used to engage students' critical and creative thinking. *one benefit of creating a spreadsheet instead of chart is that the spreadsheet's information can be used to create different types of graphs*
Five essential characteristics of cloud technology
-on demand self service -broad network access -resource pooling -rapid elasticity -measured service
Software Development Life Cycle
-planning -analysis -design -implementation -support/security
Metropolitan Area Network (MAN)
A large computer network usually spanning a city
single-user license
A license that gives you the right to install software on a single computer.
Bus Network
A network consisting of a central cable to which all network devices are attached.
Star Network
A network in which all network devices connect to one another through a single central device called the hub node.
Wired Network
A network in which computers and other devices are connected to the network via physical cables.
Ring Network
A network that connects devices in a closed loop.
Mesh Network
A network that uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area.
extranet
A private electronic network that links a company with its suppliers and customers
Near Field Communication (NFC)
A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.
What term refers to the originators exclusive legal right to reproduce, publish or sell intellectual property? a. Copyrightb. Intellectual property licensec. Public domaind. Legal right Act
A. Copyright
4. Any item or program that is available and accessible to the public without requiring permission to use and not subject to copyright is commonly referred to as ______________?a. Digital Rights management b. Public domainc. Sharewared. Native app
A. Digital rights management
The ____ is the network of all products and equipment that contain processors and can communicate with one another via the Internet, like setting your thermostat away from home. a. Internet of Things (Io T)b. Internet of Settings (Io S)c. Internet of Communications (Io C)d. Internet of Monitoring (Io M)
A. Internet of things (IoT)
This common term refers to one or more computers that act as a server and the other computers on the network request resources from the server. a. Client/server networkb. Computer/server networkc. DSL/server networkd. Cable/server network
A. client/server network
Access is a ___________ which is a collection of programs used to interact with and manage data in a database a. Database management System (DBMS)b. Database organizational System(DBOS)c. Database managerial System (DMS)d. Database institution System (DBIS)
A. database Management system (DBMS)
This device on a network connects two or more networks and directs or "routes" the flow of information along the networks. a. Routerb. Switchc. Hub d. Director
A. router
Businesses use ____________ to promote their products and services.a. Social networkingb. Private networkingc. Universal networkingd. Promotion networking
A. social networking
We refer to a collaborative website that lets users create, add to, change or delete content using their Web browsera. Wikib. Blogc. Instant messaged. Email
A. wiki
bluetooth
Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Distributed Denial of Service (DDoS)
An attack that uses many computers to perform a DoS attack.
Network Interface Card (NIC)
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.
Wireless Network
Any type of computer network that is not connected by cables of any kind.
_____ computing provides and uses computer tools such as software via the Internet. Some characteristics of this technology include, network access, resource pooling, and on demand self service.a. Privateb. Cloudc. Sharewared. Publicized
B. Cloud
This term refers to the set of rules against causing harm to others, misuse or unauthorized access of another person's files or data, protection of intellectual property, stealing and software privacy. a. Code of literacyb. Code of Conductc. Code of Rulesd. Code of plagarism
B. Code of conduct
A telecommunications company that sells Internet access, like Suddenlink, is know as a(n) ___________? a. Internet Provider Services (IPS)b. Internet Service Provider (ISP)c. Internet Modulator (IM)d. Internet Hub Station (HIS)
B. Internet service provider (ISP)
What do you call the circuit board that connects a computer to a wired or wireless network a. Network Internet Card b. Network Interface Cardc. Network Interchange Cardd. Network Connection Card
B. Network interface card
When using a database, ________ show how data in one table relates to the data in another table. a. Joiningb. Relationshipsc. Relationsd. connections
B. Relationships
This involves the sale of goods and services to the general public. a. Consumer to consumer (C2C)b. Business to consumer (B3C)c. Business to business (B2B)d. None of the these
B. business to consumer (B2C)
An unauthorized collection or distribution of data is considered a _____ breach.a. Informationb. Datac. Criminald. public
B. data
What common term below refers to protected copyright laws that refers to unique and original works, such as ideas, inventions, art, writings processes, product name and logos? a. Copyrightb. Intellectual property (IP)c. Digital copyright lawd. Intellectual materials (IM)
B. intellectual property
This commonly known term refers to the technological use of logic and prior experience to simulate human intelligence. a. Chatbotb. Machine learningc. Artificial intelligenced. Logical intelligence
C. Artificial intelligence
This system supports sales, service, marketing and many other departments in a company. a. Human Resourcesb. Customer Servicec. Customer Relationship Management systemd. Customer Sales support
C. Customer relationship management system
The columns in a database is commonly referred to as a(n) _______. a. Recordb. Itemc. Fieldd. Data
C. Field
Each row in a database table is called a _______.a. Rowb. Itemc. Recordd. field
C. Record
_____ ethics is the set of legal and moral guidelines that govern the use of technologies including computers, mobile devices, information systems and more.a. Analogb. Digitizedc. Digitald. Streaming
C. digital
______ communications is the transmittal of data, instructions and information from one computer or mobile device to another, often via the Internet. a. Analogb. Digitizedc. Digitald. Binary
C. digital
5. Updates to software that address a single issue are called __________? a. Stickersb. Bandagesc. Patchesd. Service pack
C. patches
What term below refers to voice communications over the Internet and is sometimes called Internet telephony. a. Multimedia messagingb. Voice-to-textc. Voice over Internet Protocol (VoIP)d. Webinar
C. voice over internet protocol (VoIP)
Virtual Private Network (VPN)
Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet
Local Area Network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home
Wide Area Network (WAN)
Connects devices that are not in close proximity
What is a set of coded instructions written for a computer or mobile device such as an operating system or application? a. Softwareb. Program c. "App" short for Application d. All of the above
D. all of the above
What popular term, regarding digital communication, refers to the rules of Internet etiquette?a. Mannersb. Politenessc. Etiquette protocolsd. Netiquette
D. netiquette
Flaming
Online fights using electronic messages with angry and vulgar language.
back-end database
Part of a split database that contains table objects and is stored on a file server that all users can access.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Acceptable Use Policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Carbon Copy (CC)
Sends a message to additional recipients.
digital ethics
The set of legal and moral guidelines that govern the use of technology, including computers, mobile devices, information systems, databases, and more.
artificial intelligence (AI)
The technological use of logic and prior experience to simulate human intelligence.
Bandwidth
Transmission capacity measure by bit rate
Cable modem DSL modem
Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)
Internet Service Provider (ISP)
a company that provides access to the internet for a monthly fee
denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources
intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
Network Attached Storage (NAS)
a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network
unique selling proposition (USP)
a strategy of differentiating a product by communicating its unique attributes; often becomes the common theme or slogan in the entire advertising campaign
This communication device connects a communication channel like the Internet to a sending or receiving device like a computer. a. Modem b. Hub c. Terminal keyboard d. Switch panel
a. modem
Google Docs is an excellent example of Cloud consumers most commonly interact with _______ which is software that is distributed online.a. Software as a Service (SaaS)b. Platform as a Service(PaaS)c. Infrastructure as a Service (IaaS)d. Cloud as a Service (CaaS)
a. software as a service (SaaS)
User Experience (UX)
all aspects of a person's interaction with a software application, including actions, responses, perceptions, and feelings
site license
allows an organization to provide access to as many users as they want, either by individual installations or providing network access or internet passwords
Bcc (blind carbon copy)
allows you to email two or more people without anyone being able to see the person who was the Bcc
Structured Query Language (SQL)
an international standard language for processing a database
e-business
any kind of business activity conducted online
how to secure a network?
authentication firewall encryption
A _______ is a collection of data organized in a way that allows you to access, retrieve, edit and create reports of the data. a. Datab. Spreadsheetsc. Databased. Data points
c. Database
6. The set of activities used to build a program is called the ______________.a. Software activites setb. Software program phasesc. Software Development Life Cycled. Software blue print
c. software development life cyce
Database
collection of data organized in a way that allows you to access, retrieve and create reports of that data
Database Management System (DBMS)
collection of programs used to interact with and manage data in the database
modem
communications device that connects a communications channel to a device
front-end database
contains the objects needed to interact with data, but not the tables where the record values reside
3 C's of commerce
content, community, context
router
decide that connects two or more networks
object-oriented programming
designing a program by discovering objects, their properties, and their relationships
private cloud
does not use the internet
Digital Citizenship
ethical, legal, and productive use of technology
types of free programs
freeware, shareware, public domain
digital literacy
having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies
wireframes
indicate how a user gets from one area of the program to another
big data
large and complex data sources that defy traditional data processing methods
public cloud
multiple customers use the same, internet connected cloud
types of updates to software
patches, service packs, upgrades
multiple-user license
priced per copy and allows the allocated number of copies to be used simultaneously
troubleshooting tools
process managers system information lists auditing tools patch finders restorers
e-commerce
process of conducting buy and sell transactions on an electronic network
Business Intelligence (BI)
processes and technologies used for data analysis
programs and apps by category
productivity graphics and media personal interest communications security file, disk, and system
Personal Area Network (PAN)
provides communication for devices owned by a single user that work over a short distance
Cloud Computing
providing and using computer tools, such as software, via the internet
body area network
small, lightweight biosensors implanted in the body
Malware
software that is intended to damage or disable computers and computer systems.
IrDA (Infrared Data Association)
standard to transmit data wirelessly to each other via infrared (IR) light waves.
network
system of two or more devices linked by wires, cables, or a telecommunications system
Digital Rights Management (DRM)
technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied
Netiquette
the correct or acceptable way of communicating on the Internet.
Net Neutrality
the principle that all Internet traffic should be treated equally by Internet Service Providers.
hub
transfers all data to all devices
switch
transfers data only to the intended recipient
Radio Frequency Identification (RFID)
uses electronic tags and labels to identify objects wirelessly over short distances
Social Engineering
using deception to obtain unauthorized access to information resources