Chapter 5-8 Quiz
According to the information presented in this video, a spreadsheet is great to manage information about one thing but a ____ is preferred manage information about more than one thing
database
The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ______
database administration
A(n) ____ enables an organization to centrally manage and organize data
database management system
Independent computer programs that copy themselves from one computer to others over a network are called ____
worms
Regarding IS security, DoS represents ___
denial of service
Regarding the IT infrastructure ecosystem, SAP is an example of _____
enterprise software applications
A combination of hardware and software that prevents unauthorized users from accessing a network is called a______
firewall
The unique identifier for all data in a table is called the ___
primary key
A positive regarding cloud computing includes
rapid elasticity
If a computer is sending a file, and a packet being sent is damaged, the ______ computer asks the ______ computer to retransmit it
receiving; sending
Another term for a database row is a(n) _____
record
A _____ is a program that monitors information traveling over a network and ____
sniffer; can be used for criminal purposes
Google Apps are an example of ____
software as a service (SaaS)
An important element that standardizes the communication between disparate devices on the internet is ____
transmission control protocol/internet protocol
A(n) ________ is a collection of data organized to serve many applications efficiently
Database
Software that allows an organization to manage and provide access to data is a ____
Database management systems (DBMS)
The domain name system converts ______ to _____
Domain names; IP addresses
Data redundancy is the presence of _______ in multiple files
Duplicate data
________ is used to ensure the person is who he/she claims to be
authentication
If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit _____
click fraud
An internet protocol (IP) _____
is a 32-bit number assigned to every computer on the internet
A small business that connects personal devices within a 500-meter radius is a(n)_____
local area network
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ____
phishing
The _____ is the worlds most extensive, public communication system
Internet
The Typical Computing Configuration in 1960 was ________
Mainframe
______ inclused computer viruses, works and Trojan horses
Malware
On a client/server system, most of the powerful processing is handled by the ______
Server
______ is a markup language that allows for tagging selected elements of the content of documents for their meanings an dis used for transferring data
XML
Hackers flooding a network server with many thousands of false communication request is called ______
a denial-of service attack
An information systems ____ examines a firms overall security environment and determines if the organization is properly prepared to a address threaten
audit
A(n) _____ outlines acceptable uses of information systems assets
Acceptable use policy
______ is the popular name for networking standard useful for creating small personal-area networks
Bluetooth
A grouping of characters into a word or group is called a(n)_____
Field
If you work in the health care industry, your firm will need to comply with which Act below?
HIPPA
______ is a page description language for generating web pages
HTML
Someone who intends to gain unauthorized access to a computer system is considered to be a _____
Hacker
If someone loads a program that tracks everything you type, the specific spyware is a ____
Hey logger
Every computer on the internet is assigned a unique ______
IP address
According to McAfee, ______ now pose the greatest security risk
Mobil devices
______ is a widely used open source DBMS
MySQL
Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of _______
Operating Systems platforms
Slicing digital messages into parcels is called ______
Packet switching
The field that uniquely identifies a row in a relation database table is called a _____
Primary Key
According to your reading, Macy's use _____ technology to track individuals items for sale on store shelves
RFID
______ are used to track movements of products through the supply chain
RFIDs
Microsofts most powerful DBMS is ______
SQL server
_____ is a method for encrypting network traffic on the WEb
SSL
________ converts domain names to IP addresses
The domain name system (DNS)
A _____ is a software program that mimics another program and often causes damage
Trojan horse
A(n) ____ uses the internet to create a secure network connection
Virtual private network (VPN)
To describe datasets with volumes so huge that they are beyond the ability of typical BDMS to capture, store, and analyze, the term _____ is used
big data
Data cleaning, working to identify and fix incorrect data, is also called ____
data scrubbing
According to Jacks explanation of the structure of relation database tables, which of the following statements about columns and rows is true?
each row is unique record for one of the items in the table and each column is an attribute of the item
Which below is the correct definition of "war driving"?
eavesdroppers drive by building or park outside and try to intercept wireless network traffic