MIS TEST 2
An alternative to using application server software for interfacing between a Web server and back-end databases is A) CGI. B) HTML. C) Java. D) SQL.
A) CGI.
39) ________ work by using radio waves to communicate with radio antennas placed within adjacent geographic areas. A) Cell phones B) Microwaves C) Satellites D) WANs
A) Cell phones
32) Oracle Database Lite is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) mainframe relational DBMS. D) DBMS for midrange computers
A) DBMS for small handheld computing devices.
Which of the following services enables logging on to one computer system and working on another? A) FTP B) LISTSERV C) Telnet D) World Wide Web
A) FTP
Which of the following Internet connection types offers the greatest bandwidth? A) T3 B) DSL C) cable D) T1
A) T3
Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP
A) TCP/IP
The 802.11 set of standards for wireless LANs is known as A) Wi-Fi. B) WiMax. C) Bluetooth. D) RFID.
A) Wi-Fi.
Which of the following would you be most likely to use RFID technology for? A) tracking inventory B) enabling CRM systems C) lowering network costs D) enabling client communication
A) tracking inventory
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because A) a data mart typically focuses on a single subject area or line of business. B) all the information is historical. C) a data mart uses a Web interface. D) all of the information belongs to a single company.
A) a data mart typically focuses on a single subject area or line of business.
To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wire.
A) a modem.
41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops.
A) bps.
The most common Ethernet topology is A) bus. B) star. C) ring. D) mesh.
A) bus.
Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless
A) chat
The join operation A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments.
A) combines relational tables to provide the user with more information than is otherwise available.
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary. B) data definition diagram. C) entity-relationship diagram. D) relationship dictionary.
A) data dictionary.
In TCP/IP, IP is responsible for A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.
A) disassembling and reassembling of packets during transmission.
The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy. B) data definition file. C) data quality audit. D) data governance policy
A) information policy.
A VPN A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications.
A) is an encrypted private network configured within a public network.
`Which of the following non-digital data storage items is most similar to a database? A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet
A) library card catalog
49) The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization. B) data scrubbing. C) data cleansing. D) data defining.
A) normalization.
You are creating a video and animation sharing Web site whose content will be supplied by content, video, and applets stored in a database and you anticipate very high loads on the server. Which of the following DBMSs will most likely serve your needs? A) object-relational DBMS B) relational DBMS C) hierarchical DBMS D) OODBMS
A) object-relational DBMS
Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.
A) operate over existing telephone lines to carry voice, data, and video.
28) A DBMS makes the A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different analytical views. D) logical database available for different physical views.
A) physical database available for different logical views.
36) A field identified in a table as holding the unique identifier of the table's records is called the A) primary key. B) key field. C) primary field. D) unique ID. Answer: A
A) primary key.
27) Duplicate data in multiple data files is called data ________. A) redundancy B) repetition C) independence D) partitions
A) redundancy
All network components connect to a single hub in a ________ topology. A) star B) bus C) domain D) peer-to-peer
A) star
The child domain of the root is the A) top-level domain. B) second-level domain. C) host name. D) domain extension.
A) top-level domain.
35) In a relational database, a record is referred to in technical terms as a(n) A) tuple. B) row. C) entity. D) field.
A) tuple.
A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with A) two short marks. B) one short mark. C) a crow's foot. D) a crow's foot topped by a short mark.
A) two short marks.
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n) A) uniform resource locator. B) IP address. C) third level domain. D) root domain.
A) uniform resource locator.
OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data.
A) users to obtain online answers to ad-hoc questions in a rapid amount of time.
Web browser software requests Web pages from the Internet using which protocol? A) URL B) HTTP C) DNS D) HTML
B) HTTP
) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) microwave B) LAN C) WAN D) MAN
B) LAN
A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN.
B) MAN.
What technology allows people to have content pulled from Web sites and fed automatically to their computers? A) FTP B) RSS C) HTTP D) Bluetooth
B) RSS
________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. A) OLAP B) Text mining C) Web mining D) Web content mining
B) Text mining
46) The specialized language programmers use to add and change data in the database is called A) a data access language. B) a data manipulation language. C) Structured Query Language. D) a data definition language.
B) a data manipulation language.
In a telecommunications network architecture, a protocol is A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.
B) a standard set of rules and procedures for control of communications in a network.
Tools for analyzing data to help users find patterns, relationships, and insights and make better business decisions are known as A) DSS. B) business intelligence. C) OLAP. D) data mining.
B) business intelligence.
IPv6 is being developed in order to A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.
B) create more IP addresses.
The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected.
B) creates a subset consisting of columns in a table.
The data dictionary serves as an important data management tool by A) assigning attributes to the data. B) creating an inventory of the data elements contained in the database. C) presenting data as end users or business specialists would perceive them. D) maintaining data in updated form.
B) creating an inventory of the data elements contained in the database.
The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing
B) data redundancy
The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called A) data administration. B) database administration. C) information policy administration. D) data auditing.
B) database administration.
48) DBMSs typically include report-generating tools in order to A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis.
B) display data in an easier-to-read format
Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.
B) find hidden relationships in data.
Passive RFID tags A) have their own power source. B) have a range of several feet. C) enable data to be rewritten and modified. D) are used in automated toll-collection systems
B) have a range of several feet
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as A) touch points. B) hotspots. C) hot points. D) wireless hubs.
B) hotspots.
37) A field identified in a record as holding the unique identifier for that record is called the A) primary key. B) key field. C) primary field. D) unique ID.
B) key field.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called A) multiplexing. B) packet switching. C) packet routing. D) ATM.
B) packet switching.
22) Which of the following is not one of the main problems with a traditional file environment? A) data inconsistency B) program-data independence C) lack of flexibility in creating ad-hoc reports D) poor security
B) program-data independence
34) In a table for customers, the information about a single customer would reside in a single A) field. B) row. C) column. D) table.
B) row
In a bus network A) signals are broadcast to the next station. B) signals are broadcast in both directions to the entire network. C) multiple hubs are organized in a hierarchy. D) messages pass from computer to computer in a loop.
B) signals are broadcast in both directions to the entire network.
21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC.
B) switch.
21) Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT B) the entity CUSTOMER with the attribute PURCHASE C) the entity PRODUCT with the attribute PURCHASE D) the entity PRODUCT with the attribute CUSTOMER
B) the entity CUSTOMER with the attribute PURCHASE
In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? A) "http://", myspace, blogging, com B) "http://", com, blogging, myspace C) ".", com, blogging, myspace D) ".", myspace, blogging, com
C) ".", com, blogging, myspace
The WiMax standard can transmit up to a distance of approximately A) 30 meters. B) 500 meters. C) 30 miles. D) 5 miles.
C) 30 miles.
The most common Web server today, controlling 54 percent of the market, is A) Microsoft IIS. B) WebSTAR C) Apache HTTP Server. D) Netscape Server.
C) Apache HTTP Server.
Which of the following statements is true? A) GSM is the primary U.S. digital cellular standard. B) CDMA's strength is in its international roaming capabilities. C) CDMA randomly assigns users to a range of frequencies over time. D) GSM was developed by the military during World War II.
C) CDMA randomly assigns users to a range of frequencies over time.
Which of the following is not an advantage of using VOIP? A) VOIP can reduce a firm's communication costs by 20 to 30 percent. B) It allows e-mail and voice mail to be combined into a single directory. C) It enables the creation of two distinct networks for voice and data. D) It allows new phones to be added to a network without rewiring or reconfiguring the network
C) It enables the creation of two distinct networks for voice and data.
The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis. B) SQL. C) OLAP. D) data mining.
C) OLAP.
Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.
C) Packet switching requires point-to-point circuits.
47) The most prominent data manipulation language today is A) Access. B) DB2. C) SQL. D) Crystal Reports.
C) SQL.
The next evolution in wireless communication is A) 3G networks. B) 2.5G networks. C) WiMax. D) RFID.
C) WiMax.
You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) address B) city C) airport code D) state
C) airport code
What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interface B) physical, application, Internet, and network interface C) application, transport, Internet, and network interface D) application, hardware, Internet, and network interface
C) application, transport, Internet, and network interface
T lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.
C) are high-speed, leased data lines providing guaranteed service levels.
22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching, and the development of communications standards for linking networks and computers D) client/server computing, packet switching, and HTTP
C) client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following is not one of the four defining features of Web 2.0? A) interactivity B) real-time user control C) cloud computing D) social participation
C) cloud computing
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization.
C) data scrubbing.
Bandwidth is the A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A) four B) six C) eight D) ten
C) eight
A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram.
C) entity-relationship diagram.
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of A) identifying associations. B) identifying clusters. C) identifying sequences. D) classification.
C) identifying sequences.
In terms of data relationships, associations refers to A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.
C) occurrences linked to a single event.
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) wireless network in infrastructure mode B) domain-based LAN C) peer-to-peer network D) campus area network
C) peer-to-peer network
31) The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) OODBMS. B) pre-digital DBMS. C) relational DBMS. D) hierarchical DBMS.
C) relational DBMS.
38) In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join.
C) select, project, and join.
Which of the following is NOT a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying data definition and query files D) surveying end users about their perceptions of data quality
C) surveying data definition and query files
Which of the following standards is most appropriate for creating a PAN? A) WiMax B) IEEE 802.11b C) WiFi D) Bluetooth
D) Bluetooth
33) Microsoft SQL Server is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) desktop relational DBMS. D) DBMS for midrange computers.
D) DBMS for midrange computers.
Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) IAB
D) IAB
30) DBMS for midrange computers include all of the following EXCEPT A) DB2. B) Oracle. C) Microsoft SQL Server. D) Microsoft Access.
D) Microsoft Access.
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called A) VPN. B) IAB. C) SEM. D) SEO.
D) SEO.
Which of the following statements is not true about search engines? A) They are arguably the Internet's "killer app". B) They have solved the problem of how users instantly find information on the Internet. C) They are monetized almost exclusively by search engine marketing. D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications
D) Unified communications
Which of the following distinguishes wikis from blogs? A) Wikis allow users to add content, whereas blogs are created by a single person. B) Blogs are personal publishing tools, while Wikis have business uses. C) Wikis require some knowledge of Web programming, whereas blogs are designed to be created by people without HTML skills of any kind. D) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material.
D) Wikis allow users to modify content created by other users, whereas blogs only allow comments to posted material.
Which signal types are represented by a continuous waveform? A) laser B) optical C) digital D) analog
D) analog
24) A characteristic or quality describing an entity is called a(n) A) field. B) tuple. C) key field. D) attribute.
D) attribute.
The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched
D) circuit-switched
You work for an national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations. B) identifying clusters. C) identifying sequences. D) classification.
D) classification.
The select operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.
D) creates a subset consisting of all records in the file that meet stated criteria.
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency
D) data inconsistency
Data cleansing not only corrects errors but also A) establishes logical relationships between data. B) structures data. C) normalizes data. D) enforces consistency among different sets of data.
D) enforces consistency among different sets of data.
A data warehouse is composed of A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data.
D) historic and current internal data.
23) A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity. B) uncoupling program and data. C) utilizing a data dictionary. D) minimizing isolated files with repeated data.
D) minimizing isolated files with repeated data.
The type of database management approach that can handle multimedia is the A) hierarchical DBMS. B) relational DBMS. C) network DBMS. D) object-oriented DBMS
D) object-oriented DBMS
29) The logical view A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.
D) presents data as they would be perceived by end users.
52) Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) usage mining D) user mining
D) user mining
) A network that covers broad geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.
D) wide area network.