MISY 3310 Exam 2
Big Data
- generated rapidly - has a variety of data with structured data and free-form text and logs - data sets are at least a petabyte in size - can consist of multimedia files like graphics, audio, and video CANT BE PROCESSED WITH TRADITIONAL METHODS
Hadoop
- open source software framework - inspired by Google's system for processing huge data sets - big data problem down into sub-problems - combines results into a smaller data set that is easier to analyze DOESNT extracts data from multiple tables that have a relationship.
If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed ________ meter(s).
100
___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.
Authentication
Which term refers to the wireless networking standard that is popular for creating small personal-area networks?
Bluetooth
A ________ in a database represents a single character such as a letter or number.
Byte
Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising.
Click fraud
Microsoft Azure SQL is an example of a _________________ database.
Cloud
________ computing is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualized resources over a network.
Cloud
________ are methods, policies, and organizational procedures that ensure the safety of the organization's assets.
Controls
Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________.
Cybervandalism
Which of the following involves searching for patterns and relationships among data?
Data mining
Taking over computers and directing those systems to overload a network is defined as a _____________ attack.
Denial-of-service
Network signals that are represented by on-off pulses indicate which type of signal?
Digital
Which of the following is a popular way to describe relationships (i.e., one-to-one, one-to-many) in a relational database?
Entity-relationship diagram
Which of the following is a critical security function of senior management in an organization?
Establishing the security policy and managing risk
Which of the following is NOT a function of a data warehouse?
Filter Data
Which of the following prevents unauthorized users from accessing private networks by using hardware and software to control the flow of network traffic?
Firewalls
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.
Governance
Which term refers to connecting geographically remote computers in a single network to create a "virtual supercomputer"?
Grid computing
_______________ requires that your patient records be protected and saved for six years.
HIPAA
Which of the following is an upgrade to traditional HTML because it allows the addition of multimedia features (i.e., video) without cumbersome add-ons?
HTML5
What is the name of the organization responsible for assigning public IP addresses?
ICANN
The ________________ virus was written in Visual Basic script and transmitted as an attachment to an email.
ILOVEYOU
Which statement about the TCP/IP protocol is FALSE?
IP helps to recover any packets that are lost or damaged during transmission.
The old IP address system is being replaced by the ________, which can contain more than a quadrillion possible unique addresses.
IPv6
The ________ is an advanced networking consortium representing more than 100 countries.
Internet2
______________________ is a general security term that includes computer viruses, worms, and Trojan horses.
Malware
The data _______________ language allows you to retrieve information from the database (i.e., using the SELECT, FROM, WHERE commands).
Manipulation
Which of the following is a software application that consists of interchangeable software components that integrate freely with other applications on the Internet?
Mashup
If you need a DBMS for large commercial use on a mainframe, which of the following is a viable option?
Microsoft SQL Server
Microsoft Windows Server and Linux are examples of ________.
Network operating system
Relational tables need to be ______________ to help avoid duplicate data.
Normalized
Which tool enables users to view the same data in different ways using multiple dimensions?
OLAP
An individual wanting to enable his desktop PC at home to access the Internet must do which of the following?
Obtain a subscription with an Internet Service Provider (ISP)
Which statement about public key encryption is FALSE?
On receiving the message, the recipient uses the public key to decrypt it.
Which type of software is created and updated by a worldwide community of programmers and is available for free?
Open source software
In cloud computing, why are resources considered pooled?
Organizations share the same physical hardware through virtualization.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________.
Packet switching
Which term refers to products like Microsoft's Azure and Salesforce.com's Salesforce?
Platform as a service (PaaS)
A ________ is a set of rules that programs on two communicating devices follow.
Protocol
Which technology has recently been applied to inventory control, supply chain management, and the Internet of Things?
RFID systems
____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.
Ransomware
_______________ databases are by far the most popular type of database on the market today.
Relational
Which of the following refers to the capability of a computer, product, or system to serve an increasing number of users without breaking down?
Scalability
What is the first step in effectively managing data for a firm?
Specify the information policy
What type of filtering provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver?
Stateful inspection
What is the most prominent data manipulation language and method to "question" a database?
Structured Query Language
If you wanted to have wireless connectivity in your home or apartment, you would need a(n) _________________ to move packets of data to your different devices.
Switch
The Windows operating system is an example of ______________ software.
System
A company needing reliable digital communication service levels at speeds of 1.54 Mbps would probably need to lease a dedicated ________ line.
T1
Which statement about digital certificates is FALSE?
The CA verifies a digital certificate user's identity online.
Which of the following is NOT a function of the Internet service provider (ISP)?
The ISP provides application services.
Bandwidth is determined by calculating which of the following?
The difference between the highest and lowest frequency on a channel
Which statement about the Domain Name System (DNS) is FALSE?
The first name in the domain name is the organization name.
Which of the following best defines hertz?
The number of cycles per second that can be sent through a medium
Which of the following is NOT addressed by a business continuity plan?
The technical issues involved in keeping systems up and running
Which statement about multi-tiered (N-tier) client/server networks is TRUE?
The work of the entire network is balanced over several levels of servers.
Why are legacy systems still used?
They are too expensive to redesign.
Which model can be used to analyze the direct and indirect expenses to help firms determine how much they will need to spend on specific technology implementations?
Total cost of Ownership (TCO)
A _______________ is a program that seems nonthreatening but then does something completely unexpected.
Trojan jorse
The "3V's" used to characterize big data include volume, variety, and _______.
Velocity
Which of the following is dedicated to managing HTML pages?
Web server
Which of the following does NOT need to be addressed in an organization's information policy?
What the relationships inside the data are
A company needing a network to connect its offices in Montana, Idaho, and Utah would require a ________.
Wide area network
___________ uniquely allows for presentation, communication, and the storage of data. It is often used to transfer data from one organization to another.
XML
Electronic evidence on computer storage media that is not visible to the average user is called ________.
ambient data
The signal from your iPhone earphone is a(n) ________ signal.
analog
A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform.
analog
In a student database, a column called LastName would be an example of a(n) _____________.
attribute
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication.
biometric
A ________ is represented by a 0 or 1.
bit
The bring your own device (BYOD) movement, in which personal hardware devices become integrated into business organizations, is one aspect of the ________.
consumerization of IT
A location specified to include IT infrastructure such as storage, security, and system backup is called a ________.
data center
Software for managing business data (i.e., inventory) is known as _______________ software.
data management
A common approach of networking multiple computers as opposed to a single computer is called ________ processing.
distributed
In a student database, a collection of related attributes such as LastName, FirstName, and Student# creates a(n) _______________.
entity
The most common use of non-relational database management systems is for managing ________.
extremely large data sets
Contemporary PC operating systems and application software use a ________, which makes extensive use of icons, buttons, bars, and boxes to perform tasks.
graphical user interface
A(n) ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.
keylogger
If you were building a network intended to service two buildings that were next to each other, you would construct a ________.
local area network
A ________ is a large-capacity, high-performance computer that can process large amounts of data very rapidly.
mainframe
Compared to in-house hosting, cloud-based hosting ________.
minimizes the risk of investing in technology that will soon become obsolete
At its most basic level, a(n) _________ simply consists of two or more computers that are connected together.
network
If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________.
phishing
A(n) __________ key uniquely identifies a row or record in a table.
primary
In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a(n) ______________.
record
Relational databases enforce ______________ integrity to ensure, for instance, that a teacher can't be assigned to a CLASS table unless there is already a record for that teacher in the TEACHER table.
referential
Establishing some understanding of the threats an organization faces is an example of a(n) _______________.
risk assessment
To manage their relationship with an outsourcer, firms will need a(n) ________ which defines the specific responsibilities of the service provider as well as the customer.
service level agreement (SLA)
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________.
social engineering
Lightweight portable devices such as small laptops, tablets, and smartphones, utilize ________ as the secondary storage technology.
solid state drives
Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of ________.
virtualization
The Apple Watch is a ________ computing device that operates on a mobile digital platform.
wearable
A(n) __________ is a unique type of malware that replicates itself from one computer to another and does not rely on human behavior.
worm
The Internet is based on which three key technologies?
Client/server computing, packet switching, and TCP/IP
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal?
Gramm-Leach-Bliley Act
Which law provides rules related to the creation of financial statements to help avoid fraud?
Sarbanes-Oxley Act
A method that allows complex business calculations to be performed on very large data sets in seconds is termed __________ computing.
in-memory
Education being represented by .edu and business represented by .com are examples of ________.
top-level domains