Exam 2 Information Systems 220
Which of the following is a type of ambient data?
A file deleted from a hard disk
________ is spyware that logs and transmits everything a user types.
A keylogger
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following best describes the importance of creating an accurate data model for your business's database?
It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.
Which of the following enables users to view the same data in different ways using multiple dimensions?
OLAP
You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table?
One-to-one
Which of the following is not an essential characteristic of cloud computing?
Open source software
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
Risk assessment
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?
Router
In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n):
SLA.
All of the following are tools or technologies for extracting information from unstructured data sets except:
SQL queries.
________ identify the access points in a Wi-Fi network.
SSIDs
Which of the following types of computers are used for weather forecasting on a national or worldwide scale?
Supercomputer
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption
On which of the following protocols is the Internet based?
TCP/IP
The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution?
Web services
ipRealty, which combines Google Maps with real estate data, is an example of:
a mashup
Two-factor authentication utilizes a(n):
a multistep process of authentication.
Linux is
an example of open source software.
All of the following are physical components of an RFID system except:
bar codes.
Evil twins are:
bogus wireless network access points that look legitimate to users.
IPv6 has been developed in order to:
create more IP addresses.
Client/server computing is a:
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.
A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet.
Data mining is a tool for allowing users to:
find hidden relationships in data.
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:
grid computing.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
hotspots.
A VPN:
is an encrypted private network configured within a public network.
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:
it typically focuses on a single subject area or line of business.
Software applications that combine different components of online software applications are referred to as:
mashups.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization.
In terms of the data relationships found by data mining, associations refers to:
occurrences linked to a single event.
Predictive search in Google's search engine:
predicts what you are looking for as you enter words into the query box.
The logical view of a database:
presents data as they would be perceived by end users.
Software that manages the resources of the computer is called:
system software.
Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos.
text mining
In a multitiered network
the work of the entire network is balanced over several levels of servers.
The domain .gov is a(n):
top-level domain
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
two-factor authentication.
A digital certificate system:
uses third party CAs to validate a user's identity.