Exam 2 Part 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Search engine marketing accounts for almost ________ of digital ad spending.

40 Percent

The specific characteristics of an entity are called:

Attributes

Which of the following was developed in the 1960s but can still be found in large legacy systems?

COBOL

Microsoft Word is an example of:

word processing software

A cracker is an ethical hacker hired by an organization to test the organization's security measures.

DDoS

Cloudflare suffered which of the following types of attacks?

DDoS

Which of the following types of software organizes and manages data, such as data concerned with inventory, customers, and vendors?

Data management software

A schematic that describes the manner in which two tables are related to one another in a database is called a(n):

Entity-relationship diagram

A data governance policy specifies the procedures and rules for defining the content of corporate databases.

False

A data warehouse is well suited for organizing and analyzing Big Data.

False

Client/server computing is the most widely used form of centralized processing.

False

Hadoop is particularly useful in analyzing smaller data sets of Big Data.

False

Implementing a web interface for an organization's internal database usually requires substantial changes to be made to the database.

False

Internet2 is an advanced networking consortium focused on the development of the metaverse.

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

SaaS focuses on the provision of infrastructure and programming tools that allow customers to develop their own applications.

False

The updated WPA2 standard has eliminated all vulnerabilities that might allow attackers to recover passwords.

False

Web servers can directly access a firm's back-end databases using HTML.

False

A table that links two tables that have a many-to-many relationship is often called a(n):

Intersection relation

Which of the following statements is not true about cloud computing?

It removes the concern about data and systems security for businesses.

Which of the following statements about JavaScript is not true?

JavaScript is the foundation technology for web services.

Which of the following is a core part of the zero-trust framework?

Least privilage access

What type of relationship would a table that stores employee data such as an employee's name, date of birth, and address have with a second table that stores confidential data about that employee, such as the employee's salary?

One-to-One

Rows in a table are commonly referred to as which of the following?

Records

Relational databases organize data into two-dimensional tables called:

Relations

All of the following are specific security challenges that threaten corporate servers in a client/server environment except:

Sniffing

The two primary protocols used for secure information transfer over the Internet today are:

TLS and HTTPS.

The select operation:

creates a subset consisting of all records in the file that meet stated criteria.

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

A Trojan horse:

is software that appears to be benign but does something other than expected.

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except:

the minimum response time for processing business transactions.

Companies that own Internet backbone networks are called:

Tier 1 ISPs

A hub is a networking device that sends packets of data to all other devices on the network.

True

All 50 states have enacted legislation requiring private or governmental entities to notify individuals of security breaches involving their personally identifiable information.

True

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.

True

Gartner Inc. reported that more than 25 percent of the critical data in large Fortune 1000 companies' databases is inaccurate or incomplete.

True

Mainframes today can be used as giant servers for large-scale enterprise networks.

True

Ruby on Rails is a programming language that provides a framework with tools for building feature-rich websites

True

The Internet is the largest implementation of client/server computing.

True

The Internet of Things refers to a vision of a pervasive Internet/Web, in which common objects are connected to and controlled via the Internet.

True

A ________ is software for locating and managing stored web pages.

Web server

Which of the following would you use to find patterns in user interaction data recorded by web servers?

Web usage mining

What would be a reason for using a workstation rather than a personal computer?

When you need more powerful computational abilities

Implementation controls:

audit the systems development process at various points to ensure that the process is properly controlled and managed.


Kaugnay na mga set ng pag-aaral

First Aid Written Exam Teachers and Staff MVA 2018

View Set

AP Human Geography - Unit 2 (Population and Migration) Test Review

View Set

Hazmat - Will Not Carry - General Philosophy

View Set

U.S.A. Citizenship Test (100 Civics Questions) from uscis.gov

View Set

***HURST Review Elevate Q-Cards***

View Set

Jeopardy, Season 2 (1985-1986, incomplete)

View Set

ceara enviroA climax community is one that

View Set

Chapter 11 (Climate: How Does Global Climate Change?)

View Set