Chapter 5, Chapter 6, Chapter 7, Chapter 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

1. Access is a: DBMS for mobile devices. popular open-source DBMS. DBMS for midrange computers. DBMS for desktop PC systems. DBMS for mainframe computers.

DBMS for desktop PC systems.

1. What service converts IP addresses into more recognizable alphanumeric names? HTML DNS IP HTTP URL

DNS

1. Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? Referential integrity module Data definition diagram Entity-relationship diagram Relationship dictionary Data dictionary

Data dictionary

1. Which of the following allows users to add, change, delete, or retrieve data in a database? Attribute generation Report generation tools Data dictionary Query wizard tool Data manipulation language

Data manipulation language

1. Which of the following statements about data warehouses is not true? They store supply data to be used across the enterprise for management analysis and decision making. Data warehouse systems provide a range of ad hoc and standardized query tools, analytical tools, and graphical reporting facilities. They may include data from website transactions. Data warehouse systems provide easy-to-use tools for managers to easily update data. Data warehouses make data available for anyone to access as needed.

Data warehouse systems provide easy-to-use tools for managers to easily update data.

1. Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? Desktop publishing software Spreadsheet software Graphics software Presentation software Data management software

Desktop publishing software

1. Which of the following is an example of a company whose business model is based on access to large databases through the web? Gartner Fortune IBM Microsoft Facebook

Facebook

1. Which of the following is not an example of the consumerization of IT? Google Apps Dropbox Facebook Gmail Amazon Web Services

Facebook

1. In Europe, and much of the world, the standard for cellular services is: GSM. LTE. Wi-Max. CDMA. IEEE.

GSM.

1. ________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. Capacity planning Cloud computing Green computing Utility computing On-demand computing

Green computing

1. Web browser software requests web pages from the Internet using which protocol? URL HTTP DNS HTML FTP

HTTP

1. Which organization helps define the overall structure of the Internet? None (no one "owns" the Internet) W3C ICANN IAB HTTP

IAB

1. What is the first step you should take in managing data for a firm? Identify the data needed to run the business. Cleanse the data before importing it to any database. Normalize the data before importing to a database. Audit your data quality. Remove redundancy.

Identify the data needed to run the business.

1. What type of device gathers data and converts them into electronic form for use by the computer? Output device Input device Optical storage Magnetic storage SAN

Input device

1. Common data quality problems include all of the following except: misspelled names. transposed numbers. incorrect codes. missing codes. Internet connectivity problems.

Internet connectivity problems.

1. The advanced networking consortium representing more than 500 universities, businesses, and government agencies is known as: Internet2. ICANN. IAB. W3C. FCC.

Internet2.

1. Which of the following best describes the importance of creating an accurate data model for your business's database? It is not essential, as the data model itself is modified by the database continuously. It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. It is essential, as table relationships cannot be created without an accurate data model. It is somewhat important, as the type of data model will define what kinds of data will be stored. It is unnecessary, as a well-designed database should not require one.

It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

1. Which of the following statements is not true about cloud computing? It is the fastest-growing form of computing. It removes the concern about data and systems security for businesses. It allows smaller firms to use resources previously unaffordable. It relies on the Internet as the platform for delivering services to users. Charges for cloud resources are based on resources actually used.

It removes the concern about data and systems security for businesses.

______ is an operating system-independent, processor-independent, object-oriented programming language that has become a leading interactive programming environment for the web. XML SOA HTML Java COBOL

Java

1. Which of the following is not a type of output device? Speakers Cathode ray tube Ink jet printer Keyboard Sensor

Keyboard

1. Which type of network is used to connect digital devices within a half-mile or 500-meter radius? Microwave LAN WAN MAN WSN

LAN

1. Which of the following statements about Linux is not true? Linux is a UNIX-like operating system. Linux plays a major role in running web servers and local area networks. Linux is the primary OS used in quantum computing. Linux is a robust alternative to Windows operating systems. Linux is an example of open source software.

Linux is the primary OS used in quantum computing.

1. Which of the following is not one of the four layers of the TCP/IP communications model? Application layer Transport layer Internet layer Network Interface layer Local area layer

Local area layer

1. A network that spans a city, and sometimes its major suburbs as well, is called a: CAN. MAN. LAN. WAN. WSN.

MAN.

1. Which of the following storage technology stores data sequentially? CD-ROM RAID Magnetic disks Magnetic tape USB flash drive

Magnetic tape

1. Based on your reading of the examples in the chapter, what would be the best use of RFID for a business? Logging transactions Monitoring wireless computer networks Lowering network costs Enabling client communication Managing the supply chain

Managing the supply chain

1. MongoDB and SimpleDB are both examples of: open-source databases. SQL databases. NoSQL databases. cloud databases. big data databases.

NoSQL databases.

1. Which of the following database types would be best suited for storing multimedia? SQL DBMS Open-source DBMS Non-relational DBMS Cloud-based database NoSQL DBMS.

Non-relational DBMS

1. Which of the following enables users to view the same data in different ways using multiple dimensions? Hadoop SQL Big data Data mining OLAP

OLAP

1. You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? One-to-many One-to-one Many-to-many Many-to-one One-to-all

One-to-one

1. Which of the following is not an essential characteristic of cloud computing? On-demand self-service Rapid elasticity Measured service Open source software Ubiquitous network access

Open source software

1. ________ is free software created and updated by a worldwide community of programmers. An app Open-source software Cloud-based software A web service Office software

Open-source software

1. Which of the following is not a characteristic of packet switching? Packets travel independently of each other. Packets are routed through many different paths. Packet switching requires point-to-point circuits. Packets include data for checking transmission errors. Packet switching makes efficient use of a network's communications capacity.

Packet switching requires point-to-point circuits.

1. Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? Peer-to-peer Wireless LAN Ring MAN

Peer-to-peer

1. Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space whose primary need is to share documents? PAN Domain-based LAN Peer-to-peer network Campus area network WAN

Peer-to-peer network

1. Which of the following is an example of the "visual web"? Twitter Blogger Pinterest Facebook Google

Pinterest

1. Which of the following statements about RFID is not true? RFIDs transmit only over a short range. RFIDs use an antenna to transmit data. Microchips embedded in RFIDs are used to store data. RFIDs require line-of-sight contact to be read. RFIDs can track individual units within a shipment.

RFIDs require line-of-sight contact to be read.

1. What technology allows people to have content pulled from websites and fed automatically to their computers? FTP Newsgroups HTTP Bluetooth RSS

RSS

1. Which of the following is the type of logical database model that treats data as if they were stored in two-dimensional tables? Two-tiered DBMS Pre-digital DBMS Open source DBMS Hierarchical DBMS Relational DBMS

Relational DBMS

1. What are the relationships that the relational database is named for? Relationships between rows and columns Relationships between entities Relationships between fields and records Relationships between databases Relationships between attributes

Relationships between entities

1. Which of the following is a high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers? SSN ASP LAN SAN Grid

SAN

1. The process of employing techniques to help a website achieve a higher ranking with the major search engines is called: VPN. IAB. SEM. SEO. LED.

SEO.

1. In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): TCO. SOA. SLA. API. capacity plan.

SLA.

1. A(n) ________ is a set of self-contained services that communicate with each other to create a working software application. web service hybrid cloud SOA ERP mashup

SOA

1. Which of the following is the most prominent data manipulation language today? Access DB2 SQL Crystal Reports Hadoop

SQL

1. All of the following are tools or technologies for extracting information from unstructured data sets except: sentiment analysis software. SQL queries. Hadoop. a non-relational DBMS. text mining.

SQL queries.

1. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? Modifiability Scalability Expandability Disintermediation SLA

Scalability

1. Which of the following devices collects data directly from the environment for input into a computer system? Sensor Touch screen Audio input Trackball Digital scanner

Sensor

1. Which of the following types of computer would you use to support a computer network? Server Mainframe Workstation PC Tablet

Server

1. Which of the following is considered by many to be the defining Web 2.0 application? Instant messaging Email Blogging Social networking Widgets

Social networking

1. Which of the following software tools would you use to prepare a break-even analysis? Word processing Spreadsheet Desktop publishing Personal information management Presentation graphics

Spreadsheet

1. What is the purpose of a DBMS's data definition function? Storing and managing the data in the database Storing definitions of data elements Normalizing the database Structuring the database Ensuring consistency of relationships

Structuring the database

1. Which of the following types of computer is used for weather forecasting on a national or worldwide scale? Mainframe Server Minicomputer Supercomputer PC

Supercomputer

1. Which of the following is a challenge posed by Wi-Fi networks? Lack of broadband support Connectivity issues with wired LANs Susceptibility to interference from nearby wireless systems High cost of infrastructure technology Size of access points

Susceptibility to interference from nearby wireless systems

1. Which protocol is the Internet based on? TCP/IP FTP Packet-switching HTTP Telnet

TCP/IP

1. Which of the following services enables logging on to one computer system and working on another? FTP LISTSERV Telnet World Wide Web T1 lines

Telnet

1. Which of the following statements about client/server computing is not true? The client provides the user interface. The bulk of processing occurs on the client. Computing on the Internet is based on the client/server model. The client is normally a desktop or laptop computer. The server provides security, remote access, and user authentication.

The bulk of processing occurs on the client.

1. Which of the following best illustrates the relationship between entities and attributes? The entity CUSTOMER with the attribute PRODUCT The entity CUSTOMER with the attribute ADDRESS The entity PRODUCT with the attribute PURCHASE The entity PRODUCT with the attribute CUSTOMER The entity ADDRESS with the attribute CUSTOMER

The entity CUSTOMER with the attribute ADDRESS

1. Which of the following statements is not true about search engines? They are arguably the Internet's "killer app." They have solved the problem of how users instantly find information on the Internet. They are monetized almost exclusively by search engine marketing. They emerged in the early 1990s as simple software programs. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

1. Which of the following is an example of a legacy system? Transaction processing system running on a mainframe Scalable grid computing system Web services running on a cloud computing platform MDM software Quantum computing system

Transaction processing system running on a mainframe

1. Which process is used to protect transmitted data in a VPN? Tunneling PPP VOIP Packet switching Hypertext

Tunneling

1. Which of the following is an interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking? UNIX Linux OS X COBOL Chrome

UNIX

1. ________ integrate(s) disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. Wireless networks Intranets Virtual private networks Telnet Unified communications

Unified communications

1. Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? Java C++ XML Visual Basic COBOL

Visual Basic

1. Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are known as: MANs. WANs. LANs. PANs. WSNs.

WSNs.

1. The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following? Cloud computing Web services Nanotechnology SaaS PaaS

Web services

1. The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? Mashups Extranet Web services Cloud computing Intranet

Web services

1. Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites? Web usage mining Web server mining Web structure mining Web content mining Web protocol mining

Web structure mining

1. Which of the following would you use to find patterns in user interaction data recorded by web servers? Web usage mining Web server mining Web structure mining Web content mining Web protocol mining

Web usage mining

1. What would be a reason for using a workstation rather than a personal computer? When you need more powerful computational abilities When you need to access a network When you need to serve applications and data to client computers When you need to share resources When you need to connect to a cloud computing platform

When you need more powerful computational abilities

1. The 802.11 set of standards is known as: WLAN. WSN. Wi-Fi. WiMax. Bluetooth.

Wi-Fi.

1. Which of the following enables multiple users to create and edit web documents? Wiki Blog Social networking Pinterest RSS

Wiki

1. What is the foundation technology for web services? HTML XML SOAP UDDI Java

XML

1. Running a Java program on a computer requires: a Java Virtual Machine to be installed on the computer. a Java Virtual Machine to be installed on the server hosting the Java applet. an applet to be downloaded to the user's computer. no extra or specialized software, as Java is platform-independent. an Intel processor and the Windows operating system.

a Java Virtual Machine to be installed on the computer.

1. ZipRealty, which combines Google Maps with real estate data, is an example of: cloud computing. SOA. a widget. a mashup. a web service.

a mashup.

1. To use the analog telephone system for sending digital data, you must also use: coaxial cable. a router. DSL. twisted wire. a modem.

a modem.

1. In a telecommunications network architecture, a protocol is: a device that handles the switching of voice and data in a local area network. a standard set of rules and procedures for control of communications in a network. a communications service for microcomputer users. the main computer in a telecommunications network. a system by which packets are sent over different networks.

a standard set of rules and procedures for control of communications in a network.

1. The "Internet of Things" refers to: the increasing focus on shopping as the major user activity on the Internet. the microblogging trend, in which users exchange short text and pictures rather than longer and more in-depth content and text. the rise in mobile gaming. the trend away from platform-independent web applications to mobile-device specific apps. a vision of a pervasive web in which common objects are connected to and controlled over the Internet.

a vision of a pervasive web in which common objects are connected to and controlled over the Internet.

1. A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. hot spot access point server wireless router wireless sensor

access point

1. A LAN could be used to connect all of the following except: all of the computers in a large building. all of the devices within a 10-meter area. all of the computers in a city. all of the computers in a small office. all of the computers on a college campus.

all of the computers in a city.

1. Linux is: primarily concerned with the tasks of end users. designed for specific machines and specific microprocessors. an example of open-source software. especially useful for processing numeric data. the operating system for the Macintosh computer.

an example of open-source software.

1. Pre-configured hardware-software systems that use both relational and non-relational technology optimized for analyzing large datasets are referred to as: hybrid DBMS. Hadoop. BI. analytic platforms. data marts.

analytic platforms.

1. Software used to apply the computer to a specific task for an end user is called: system software. application software. data management software. network software. web services software.

application software.

1. T lines: operate over existing telephone lines to carry voice, data, and video. operate over coaxial lines to deliver Internet access. are used in connection with satellite Internet access. have up to twenty-four 64-Kbps channels. are high-speed, leased data lines providing guaranteed service levels.

are high-speed, leased data lines providing guaranteed service levels.

1. A characteristic or quality describing an entity is called a(n): field. tuple. key field. attribute. table.

attribute.

1. The smallest unit of data a computer can handle is called a: file. record. field. byte. bit.

bit.

1. The total amount of digital information that can be transmitted through any telecommunications medium is measured in: bps. Hertz. baud. gigaflops. ROM.

bps.

1. Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: DSS. business intelligence. OLAP. data mining. in-memory computing.

business intelligence.

1. Virtualization: allows one operating system to manage several physical machines. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. can boost server utilization rates to 70% or higher. allows smartphones to run full-fledged operating systems. uses the principles of quantum physics to represent data.

can boost server utilization rates to 70% or higher.

1. You use ________ to predict when a computer hardware system becomes saturated. capacity planning virtualization localization measured service SLAs

capacity planning

1. The business case for using grid computing involves all of the following except: cost savings. centralized maintenance. speed of computation. agility. increased computational power.

centralized maintenance.

1. Instant messaging is a type of ________ service. mobile cellular email wireless chat

chat

1. The telephone system is an example of a ________ network. peer-to-peer wireless packet-switched TCP/IP circuit-switched

circuit-switched

1. The main challenge coming to Microsoft's Office software suite will be: open-source, Linux-based suites such as OpenOffice. cloud-based productivity software such as Google Docs and Google Apps. mobile software. in-house, custom software created using open-source web services. Apple's iWork.

cloud-based productivity software such as Google Docs and Google Apps.

firewall

combination of hardware and software that prevents unauthorized users from accessing private networks

1. IPv6 was developed in order to: update the packet transmission protocols for higher bandwidth. create more IP addresses. allow for different levels of service. support Internet2. support Web 3.0.

create more IP addresses.

1. The select operation: combines relational tables to provide the user with more information than is otherwise available. creates a subset consisting of columns in a table. identifies the table from which the columns will be selected. creates a subset consisting of all records in the file that meet stated criteria. specifies the content of the database.

creates a subset consisting of all records in the file that meet stated criteria.

1. The project operation: combines relational tables to provide the user with more information than is otherwise available. creates a subset consisting of columns in a table. organizes elements into segments. identifies the table from which the columns will be selected. stores definitions of data elements.

creates a subset consisting of columns in a table.

1. Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: system software. application software. data management software. network software. web services software.

data management software.

1. A(n) ________ is a structured survey of the accuracy and level of completeness of the data in an information system. data quality audit systems analysis systems audit data analysis data overview

data quality audit

1. The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. batch processing data redundancy data independence online processing data freedom

data redundancy

1. Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: data auditing. defragmentation. data scrubbing. data optimization. data repair.

data scrubbing.

1. Within a corporate information services department, the task of establishing the physical database and its logical relations are responsibilities of the ________ function. data management data administration server administration data modeling database administration

database administration

1. A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. web server online server database server client server application server

database server

disaster recovery planning

devises plans for restoration of disrupted services; focuses on technical issues involved in keeping systems up and running

1. Bandwidth is the: number of frequencies that can be broadcast through a medium. number of cycles per second that can be sent through a medium. difference between the highest and lowest frequencies that can be accommodated on a single channel. total number of bytes that can be sent through a medium per second. number of packets sent per minute over a medium.

difference between the highest and lowest frequencies that can be accommodated on a single channel.

1. In TCP/IP, IP is responsible for: disassembling and reassembling of packets during transmission. establishing an Internet connection between two computers. moving packets over the network. sequencing the transfer of packets. acknowledging the packets sent.

disassembling and reassembling of packets during transmission.

1. Data mining is more ________ than OLAP. data-focused multidimensional query oriented discovery driven streamlined

discovery driven

1. DBMS typically include report-generating tools in order to: retrieve and display data. display data in tables. display data in graphs. perform predictive analysis. display data in an easier-to-read-format.

display data in an easier-to-read-format.

1. The use of multiple computers linked by a communications network for processing is called: grid computing. distributed processing. client/server computing. centralized processing. supercomputing.

distributed processing.

1. Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. four six eight ten twenty

eight

encryption

encoding messages before they enter the network, and then decoding at the receiving end

1. A schematic of the entire database that describes the relationships in a database is called a(n): data dictionary. intersection relationship diagram. field key diagram. data definition diagram. entity-relationship diagram.

entity-relationship diagram.

1. In terms of the data relationships found by data mining, sequences refers to: events linked over time. patterns that describe a group to which an item belongs. occurrences linked to a single event. undiscovered groupings. classifications when no groups have yet been defined.

events linked over time.

1. Data mining is a tool for allowing users to: quickly compare transaction data gathered over many years. perform multidimensional data analysis. obtain online answers to ad hoc questions in a rapid amount of time. summarize massive amounts of data into much smaller, traditional reports. find hidden relationships in data.

find hidden relationships in data.

1. The most basic business database is comprised of: three tables: for suppliers, parts, and sales. four tables: for customers, suppliers, parts, and sales. four tables: for customers, suppliers, sales, and employees. five tables: for customers, employees, suppliers, parts, and sales. attributes instead of tables.

five tables: for customers, employees, suppliers, parts, and sales.

denial of service attacks

flooding server with thousands of false requests to crash the network

business continuity planning

focuses on restoring business operation after disaster; identifies critical business process and determine action plans if systems go down

1. Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: co-location. cloud computing. grid computing. client/server computing. centralized processing.

grid computing.

1. All of the following are features of smartwatches except a(n): accelerometer. altimeter. compass. gyrometer. barometer.

gyrometer.

1. One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: touch points. tunnels. hot points. wireless hubs. hotspots.

hotspots.

1. In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. scalable quantum grid hybrid cloud private cloud

hybrid cloud

1. A one-to-one relationship between two entities is symbolized in a diagram by a line that ends: in two short marks. in one short mark. with a crow's foot. with a crow's foot topped by a short mark. with a crow's foot topped by two short marks.

in two short marks.

worms

independent computer programs that copy themselves from one computer to other computers over a network

1. A table that links two tables that have a many-to-many relationship is often called a(n): derived table. intersection relation. foreign table. entity-relationship table. derived relation.

intersection relation.

1. A VPN: is an encrypted private network configured within a public network. is more expensive than a dedicated network. provides secure, encrypted communications using Telnet. is an Internet-based service for delivering voice communications. formats web pages with dynamic links to other documents.

is an encrypted private network configured within a public network.

1. A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: it typically focuses on a single subject area or line of business. all the information is historical. it uses a web interface. all of the information belongs to a single company. it is open-source.

it typically focuses on a single subject area or line of business.

1. A field identified in a record as holding the unique identifier for that record is called the: primary key. key field. primary field. foreign key. identifying field.

key field.

risk assessment

manage the likelihood that threats will be successful and determines level of risk to firm if specific activity or process is not properly controlled

1. Software applications that combine different components of online software applications are referred to as: integrated software. widgets. mashups. grid computing. web services.

mashups.

secure sockets layer

most common form of securing transaction between merchants and consumers

1. A ________ is special software that routes and manages communications on the network and coordinates networks resources. switch firewall server network operating system/NOS hotspot

network operating system/NOS

1. In clustering, a data mining tool will find: new groupings within data. related predictions from existing values. several events grouped by time. new associations. forecasts for future events.

new groupings within data.

1. The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: normalization. data scrubbing. data cleansing. data administration. data management.

normalization.

1. OLAP is a tool that enables users to: obtain online answers to ad hoc questions in a rapid amount of time. view both logical and physical views of data. quickly diagram data relationships. normalize data. find hidden patterns in large databases.

obtain online answers to ad hoc questions in a rapid amount of time.

1. In terms of the data relationships found by data mining, associations refers to: events linked over time. patterns that describe a group to which an item belongs. occurrences linked to a single event. undiscovered groupings. classification when no groups have yet been defined.

occurrences linked to a single event.

1. Hadoop is a(n): NoSQL database technology that stores both data and procedures acting on the data as objects. data mining platform designed for storing and analyzing big data produced by web communications and transactions. open-source software framework designed for distributing data-processing over inexpensive computers. pre-configured hardware-software system designed for analyzing big data. high-speed platform used to analyze large data sets.

open-source software framework designed for distributing data-processing over inexpensive computers.

1. Digital subscriber lines: operate over existing telephone lines to carry voice, data, and video. operate over coaxial lines to deliver Internet access. are very-high-speed data lines typically leased from long-distance telephone companies. have up to twenty-four 64-Kbps channels. are based on radio signals of various frequencies.

operate over existing telephone lines to carry voice, data, and video.

1. Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. VOIP routers servers coaxial cable packet switching

packet switching

1. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: multiplexing. packet switching. packet routing. ATM. software-defined networking.

packet switching.

1. A DBMS makes the: relational database available for different analytical views. logical database available for different analytical views. physical database available for different relational views. relational database available for different physical views. physical database available for different logical views.

physical database available for different logical views.

1. In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively? "http://", myspace, blogging, .com "http://", .com, blogging, myspace "http://", blogging, .com myspace, blogging, .com .com, blogging, myspace

.com, blogging, myspace

1. The WiMax standard can transmit up to a distance of approximately: 30 meters. 500 meters. 30 miles. 5 miles. 1 mile.

30 miles.

1. The world's data centers use as much energy as the output of ________ nuclear power plants, which is about ________ percent of all the energy use in the world. 10; 1 20; 2.5 30; 1.5 50; 10 100; 25

30; 1.5

1. Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. 10 percent 25 percent 35 percent 50 percent 80 percent

35 percent

1. Data center traffic is expected to increase by ________ percent by 2016. 50 100 200 300 400

400

1. What is the primary difference between 3G and 4G cellular systems? 4G systems are digital. 4G systems have greater transmission speeds. 3G systems are unable to handle web browsing. 3G systems have poor security. 3G systems are not compatible with text messaging.

4G systems have greater transmission speeds.

access control

policies and procedures to prevent improper access to systems by unauthorized insiders and outsiders

1. Approximately what percentage of U.S. households has high-speed broadband connections? 10 percent 25 percent 50 percent 75 percent 99 percent

75 percent

1. At the client level, ________ percent of PCs use some form of the Microsoft Windows operating system. 50 70 80 90 100

90

1. Which of the following is an example of a pre-digital database? A library's card-catalog A cash register receipt A doctor's office invoice A list of sales totals on a spreadsheet An SQL database

A library's card-catalog

1. MySQL is a: DBMS for mobile devices. programming language. mainframe relational DBMS. DBMS for desktop systems. popular open-source DBMS.

popular open-source DBMS.

1. Links pointing to an online document are a sign of: richness or variety of topics covered. popularity. data quality. data usage. marketing.

popularity.

1. Which signal types are represented by a continuous waveform? Laser Optical Digital Analog Hybrid

Analog

1. Which of the following is an open-source operating system designed for mobile devices? iOS OS X Chrome Android Apache HTTP

Android

1. The most common web server today, controlling 65 percent of the market, is: Microsoft IIS. WebSTAR. Apache HTTP Server. Netscape Server. IBM NetServer.

Apache HTTP Server.

1. What are the four layers of the TCP/IP reference model? Physical, application, transport, and network interface Physical, application, Internet, and network interface Application, transport, Internet, and network interface Application, hardware, Internet, and network interface Hardware, software, transport, and application

Application, transport, Internet, and network interface

1. The logical view of a database: shows how data are organized and structured on the storage media. presents an entry screen to the user. allows the creation of supplementary reports. presents data as they would be perceived by end users. shows the relationships between entities and attributes.

presents data as they would be perceived by end users.

1. A field identified in a table as holding the unique identifier of the table's records is called the: primary key. key field. primary field. foreign key. identifying field.

primary key.

1. The most appropriate wireless networking standard for creating PANs is: I-mode. 802.11b. WiFi. 802.11n. Bluetooth.

Bluetooth.

1. Which of the following is a type of optical disc storage? CD-ROM Hard drive USB flash drive Magnetic tape SSD

CD-ROM

1. The Internet is based on which three key technologies? TCP/IP, HTML, and HTTP TCP/IP, HTTP, and packet switching Client/server computing, packet switching, and the development of communications standards for linking networks and computers Client/server computing, packet switching, and HTTP HTTP, Web 3.0, and the mobile platform

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

1. Which of the following is considered to be the fastest growing form of computing? Wearable computing Green computing Nanocomputing Enterprise computing Cloud computing

Cloud computing

1. In co-location, a firm: purchases and owns its web server but locates the server in the physical facility of a hosting service. contracts with an external vendor to run its computer center and networks. off-loads peak demand for computing power to remote, large-scale data centers. utilizes an external, distributed computing grid. uses only open source software to operate its computer systems.

purchases and owns its web server but locates the server in the physical facility of a hosting service.

1. Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. intersection relations one-to-one ordering entity-relationship diagrams foreign keys referential integrity rules

referential integrity rules

1. Links coming out of an online document are a sign of: richness or variety of topics covered. popularity. data quality. data usage. marketing.

richness or variety of topics covered.

viruses

rogue software programs that attach itself to other software programs or data files in order to be executed

1. In a table for customers, the information about a single customer would reside in a single: field. entity. column. table. row.

row.

1. In a relational database, the three basic operations used to develop useful sets of data are: select, project, and where. select, join, and where. select, project, and join. select, from, and join. who, what, and where.

select, project, and join.

phishing

setting up fake web sites or sending e mail messages that look like legitimate businesses to ask users for confidential personal data

1. All of the following are examples of wearable computing devices except: smartwatches. smart badges. activity trackers. smart glasses. smartphones.

smartphones.

1. Translating software to different languages is commonly referred to as: software localization. scaling. service-oriented architecture. outsourcing. open sourcing.

software localization.

spyware

software program that aids in gathering information about persons or organization without their knowledge

trojan horses

software program that appears to be benign but contains a second hidden function that may cause damage

1. A networking approach where many control functions for managing the movement of data on a network are managed by a central program separately from the network itself is known as: service-oriented architecture. software-defined networking. software-as-a-service. remote network management. cloud networking.

software-defined networking.

1. Microsoft Excel is an example of: data management software. spreadsheet software. presentation graphics. word processing software. presentation graphics software.

spreadsheet software

1. The primary storage technologies are: storage networks, magnetic tape, magnetic disk, and optical disk. hard drives, magnetic tape, magnetic disk, and optical disk. storage networks, magnetic disks, hard disks, and optical disks. hard drives, removable drives, storage networks, and magnetic tape. flash drives, SSDs, storage networks and magnetic disks.

storage networks, magnetic tape, magnetic disk, and optical disk.

1. The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): hub. switch. router. NIC. LAN.

switch.

1. Software that manages the resources of the computer is called: system software. application software. data management software. network software. web services software.

system software.

1. Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos. Hadoop web mining text mining OLAP DBMS

text mining

1. An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except: the minimum response time for processing business transactions. lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. real estate and utility costs for housing and providing power for the technology. the purchase or license of software for each user. the cost to provide training to information systems specialists and end users.

the minimum response time for processing business transactions.

1. An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except: the maximum number of users a system can accommodate at one time. the minimum response time for processing business transactions. the impact of future software applications. the purchase price of new computer hardware equipment. the volume of transactions.

the purchase price of new computer hardware equipment.

1. In a multitiered network: the work of the entire network is centralized. the work of the entire network is balanced over several levels of servers. processing is split between clients and servers. processing is handled by multiple, geographically remote clients. users interface with the server rather than the client.

the work of the entire network is balanced over several levels of servers.

1. The child domain of the root is the: top-level domain. second-level domain. host name. domain extension. base domain.

top-level domain.

1. To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: total cost of ownership model. return on investment model. break-even point. cost benefit analysis. capacity plan.

total cost of ownership model.

1. In a relational database, a record is also called a(n): tuple. key field. entity. field. table.

tuple.

1. A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ________ architecture. service-oriented on-demand multitiered client/server two-tiered client/server grid

two-tiered client/server

1. Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): uniform resource locator. IP address. third level domain. root domain. VPN.

uniform resource locator.

1. A data ________ stores current and historical data of potential interest to decision makers throughout the company. warehouse mart archive mine center

warehouse

1. A network that covers entire geographical regions is most commonly referred to as a(n): local area network. intranet. peer-to-peer network. metropolitan area network. wide area network.

wide area network.

1. A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: in two short marks. in one short mark. with a crow's foot. with a crow's foot preceded by a short mark. in three short marks.

with a crow's foot preceded by a short mark.

1. Microsoft Word is an example of: open-source software. word-processing software. software productivity suite. data management software. presentation graphics software.

word-processing software.


Kaugnay na mga set ng pag-aaral

Chapter 21: The Renaissance in Quattrocento Italy

View Set

Steroidal Antiinflammatory Drugs EDAPT

View Set

BYU BIOL-043-S002 Biology Quizzes

View Set

India quiz nationals🐰🙏(1.5)

View Set

Entrainements hybrides "Fonction start-stop"

View Set

AC456 Chapter 6: Accounting for General Long-Term Debt and Debt Service

View Set

Antebellum America and American Sectionalism

View Set

Growth & Development - Adolescent

View Set