Exam 2 Part 1
Search engine marketing accounts for almost ________ of digital ad spending.
40 Percent
The specific characteristics of an entity are called:
Attributes
Which of the following was developed in the 1960s but can still be found in large legacy systems?
COBOL
Microsoft Word is an example of:
word processing software
A cracker is an ethical hacker hired by an organization to test the organization's security measures.
DDoS
Cloudflare suffered which of the following types of attacks?
DDoS
Which of the following types of software organizes and manages data, such as data concerned with inventory, customers, and vendors?
Data management software
A schematic that describes the manner in which two tables are related to one another in a database is called a(n):
Entity-relationship diagram
A data governance policy specifies the procedures and rules for defining the content of corporate databases.
False
A data warehouse is well suited for organizing and analyzing Big Data.
False
Client/server computing is the most widely used form of centralized processing.
False
Hadoop is particularly useful in analyzing smaller data sets of Big Data.
False
Implementing a web interface for an organization's internal database usually requires substantial changes to be made to the database.
False
Internet2 is an advanced networking consortium focused on the development of the metaverse.
False
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
False
RFID technology is being gradually replaced by less costly technologies such as WSNs.
False
SaaS focuses on the provision of infrastructure and programming tools that allow customers to develop their own applications.
False
The updated WPA2 standard has eliminated all vulnerabilities that might allow attackers to recover passwords.
False
Web servers can directly access a firm's back-end databases using HTML.
False
A table that links two tables that have a many-to-many relationship is often called a(n):
Intersection relation
Which of the following statements is not true about cloud computing?
It removes the concern about data and systems security for businesses.
Which of the following statements about JavaScript is not true?
JavaScript is the foundation technology for web services.
Which of the following is a core part of the zero-trust framework?
Least privilage access
What type of relationship would a table that stores employee data such as an employee's name, date of birth, and address have with a second table that stores confidential data about that employee, such as the employee's salary?
One-to-One
Rows in a table are commonly referred to as which of the following?
Records
Relational databases organize data into two-dimensional tables called:
Relations
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
Sniffing
The two primary protocols used for secure information transfer over the Internet today are:
TLS and HTTPS.
The select operation:
creates a subset consisting of all records in the file that meet stated criteria.
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
A Trojan horse:
is software that appears to be benign but does something other than expected.
An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except:
the minimum response time for processing business transactions.
Companies that own Internet backbone networks are called:
Tier 1 ISPs
A hub is a networking device that sends packets of data to all other devices on the network.
True
All 50 states have enacted legislation requiring private or governmental entities to notify individuals of security breaches involving their personally identifiable information.
True
An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment.
True
Gartner Inc. reported that more than 25 percent of the critical data in large Fortune 1000 companies' databases is inaccurate or incomplete.
True
Mainframes today can be used as giant servers for large-scale enterprise networks.
True
Ruby on Rails is a programming language that provides a framework with tools for building feature-rich websites
True
The Internet is the largest implementation of client/server computing.
True
The Internet of Things refers to a vision of a pervasive Internet/Web, in which common objects are connected to and controlled via the Internet.
True
A ________ is software for locating and managing stored web pages.
Web server
Which of the following would you use to find patterns in user interaction data recorded by web servers?
Web usage mining
What would be a reason for using a workstation rather than a personal computer?
When you need more powerful computational abilities
Implementation controls:
audit the systems development process at various points to ensure that the process is properly controlled and managed.