CIS 314 - Chapter 4-6 Review
___________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
Accountability
Firms that allow employees to use their own devices are embracing which of the following?
BYOD
Which of the following is a leading networking hardware provider?
Cisco
Which of the following statements about cookies is not true?
Cookies are installed only at the user's request.
Which of the following protects the authors of a book from having their work copied by others?
Copyright law
In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources?
Data administration
Which of the following occurs when the same attribute in related data files has different values?
Data inconsistency
________________ creates confusion that hampers the creation of information systems that integrate data from different sources
Data redundancy
In a large organization, which of the following functions would be responsible for physical database design and maintenance?
Database administration
T or F: Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.
False
T or F: The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?
Profiling
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?
Property rights and obligations
A SAN is a ________ _____ network.
Storage Area
T of F: You can manipulate data on a web server by using a CGI script.
True
T or F: An applications server may reside on the same computer as a web server or on its own dedicated computer.
True
T or F: Cloud computing is the fastest growing form of computing.
True
T or F: Copyright is a legal protection given to creators of certain types of intellectual property.
True
T or F: DBMS have a data definition capability to specify the structure of the content of the database.
True
T or F: In financial service firms, investments in IT infrastructure represent more than half of all capital invested.
True
T or F: Legacy systems are used to populate and update data warehouses.
True
T or F: Liability is a feature of political systems and allows individuals to recover damages done to them by others.
True
T or F: Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
True
T or F: Program data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.
True
T or F: Routine violations of individual privacy are made easier by advances in data storage.
True
T or F: Scalability refers to the ability to of a computer, product, or system to expand to serve a large number of users without breaking down.
True
T or F: The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent v. buy decision.
True
T or F: a physical view shows data as it is actually organized and structured on the data storage media.
True
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?
Virtualization
The FIP principle of Notice/Awareness states that:
Websites must disclose their information practices before collecting data.
A schematic of the entire database that describes the relationships in a database is called a(n):
entity-relationship diagram
A data warehouse of:
historic and current internal data
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):
information policy
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization
Software that manages the resources of the computer are called:
operating system software
The practice of contracting custom software development to an outside firm is commonly referred to as
outsourcing
A field identified in a table as holding the unique identifier of the table's records is called the:
primary key
A(n) __________________ represent data as two-dimensional tables.
relational DBMS
In a table for customers, the information about a single customer would reside in a single:
row
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?
the Golden Rule
According to the ________, you should take the action that produces the least harm.
the risk aversion principle
___________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
T of F: Multiple data marts are combined and streamlined to create a data warehouse.
False
T or F: A record is a characteristic or quality used to describe a particular entity.
False
T or F: Application server software is responsible for locating and managing stored webpages.
False
T or F: Associations are occurrences linked to multiple events.
False
T or F: Client/server computing is a primary example of centralized processing.
False
T or F: Quantum computing is implemented primarily with enterprise or ISP servers.
False
T or F: Relational DBMS use key field rules to ensure that relationships between coupled tables remain consistent.
False
T or F: SANs maintain a servers and provide fee-paying subscribers with space to maintain their websites.
False
T or F: TCO refers to the original cost of purchased technology: both hardware and software.
False
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPAA
Which of the following is not one the key technology trends that raises ethical issues?
Increase in data quality
Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?
Information rights and obligations
______________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard.
Multitouch
Which type of software is created and updated by a worldwide community of programmers and available for free?
Open Source
In the _____________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.
Opt-In
___________ grants the owner exclusive ownership of the ideas behind the invention for 20 years.
Patent
_________ means to accept the potential costs and obligations for the decisions you make.
Responsibility
Which of the following is the most prominent data manipulation language today?
SQL
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?
Slippery-slope Rule
Which of the following is NOT an example of the moral dimensions of the information age identified in the text?
The emergence of giant tech firms that dominate their markets
Which of the following best describes how new information systems can result in legal grey areas?
They result in new situations that are not covered by old laws.
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
Total cost of ownership
A characteristic or quality that describes a particular database entity is a(n):
attribute
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:
browser
All of the following are technologies used to analyze and manage big data:
cloud computing
Interpretations of Moore's law assert that:
computing power doubles every 18 months
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
data scrubbing