MIS 301
________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.
3G
LTE is a __ cellular technology
4G
__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.
BPI
__ is a remote attack requiring no user action
DoS
hackers would use a botnet to perform a
DoS
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.
False
only a few __ satellites are needed for global coverate
GEO
__ was developed bc we have run out of IP addresses in the OG IP addressing scheme
IPv6
network that is restricted to a single building is a
LAN
Satellite telephone services are provided through __ satellites
LEO
________ satellites are used to run the GPS system.
MEO
the __ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected
Opt-out
Which of the following is FALSE of QR codes?
QR codes can be read from any direction or angle. QR codes can store much more information than bar codes. ***QR codes are larger than bar codes because they store information both horizontally and vertically. QR codes are more resistant to damage than bar codes.
which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivering, and reassembling data during transmission
__ is the most popular query language used for interacting with a database.
SQL
which of the following is the most prominent data manipulation language today?
SQL
__ is the protocol of the internet
TCP/IP
________ defines how messages are formulated and how their receivers interpret them.
TCP/IP
__ is a private network that uses a public network to connect users
VPN
The Internet is a __
WAN
which of the following is the correct order of networks from largest to smallest
WAN, MAN, LAN, PAN
__issues involve the authenticity, fidelity, and correctness of information that is collected and processed
accuracy
__ causes pop-up advertisements to appear on your screen
adware
In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.
affiliate marketing
The IT infrastructure is ___
all of the above put together (IT personnel; IT services; IT components)
each characteritic or quality of a particular entity is called a
attribute
which of the following is an accurate representation of the hierarchy from smallest to largest
bit, byte, field, record, file, database
bandwidth is stated in __ per second
bits
which of the following is NOT an example of alien software
blockware
________ is a short-range wireless network.
bluetooth
_________ organizations have physical and online dimensions.
clicks-and-mortar
the __ approach highlights the interlocking relationships that underlie all socieities
common good
which of the following would be an example of a SCADA attack
computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant
which of the following is the correct order of the KMS Cycle
create, capture, refine, store, manage, disseminate
__ is a disadvantage of fiber-optic cable
difficult to work with
the __ approach posits that ethical actions treat all human beings equally or if unequally then fairly based on some defensible standard
fairness
__ cables are made of glass
fiber-optic
is a communications control
firewall
the __ creates links between two tables
foreign
In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.
forward; higher
__ is not an advantage of twisted-pair wire
high bandwidth
a __ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations
hot
intellectual capital is another term for _
knowledge
__ is an example of pre-digital data storage that is comparable to a database
library card catalog
a data __ is a low-cost, scaled-down version of a data__ that is designed for the end-user needs in an SBU or an individual department
mart; warehouse
________ transmission systems transmit data through electromagnetic waves.
microwave
You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce
mobile
Dashboards are used in which process?
monitoring process performance
The ________ layer of TCP/IP provides communication and packet services.
network interface
the __ model of informed consent prohibits an organization from collecting any personal information unless the customer specially authorizes it
opt-in
the __ key is an identifier field that uniquely identifies a record
primary
__ refers to determining who is responsible for actions that were taken
privacy
With ________, customers use the internet to self-configure products or services.
product customization
in public-key encryption, the __ key is used for locking and the __ key is used for unlocking
public; private
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
radio
database systems minimize
redundancy
__ means that you accept the consequence of your decisions and actions
responbility
In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.
reverse; lower
The __ approach maintains that an ethical action is on that best protects and respects the moral rights of the affected parties
rights
each relational database table contains records (listed in__) and attributes (listed in __)
rows; columns
which of the following is not "unstructured data"
spreadsheet
__ collects personal information about users without their consent
spyware
under the convention of business flowchart, __ shape is used to represent questions. __ square shape is used to represent actions. how many branches should be followed by a question__?
triangle; square; 2
__ is an attack by a programmer developing a system
trojan horse
In ________, recipients of your marketing notices send information about your product to their friends.
viral marketing
_________ organizations are only online.
virtual
__ is a remote attack requiring user action
virus
which of the following is NOT a characteritc of big data
viscous
an informaiton system's __ is the likelihood that the system or resource will be comprised by a that will result in its __ to further attacks
vulnerability; threat; exposure
__ is the most difficult, radical, lengthy, and comprehensive strategy
BPR
_________ organizations are purely physical.
brick-and-mortar
a __ is a group of eight__
byte; bits
IT ___ can be used to create a competitive advantage__
can; when it is used effectively
__ cables are made of copper
coaxial
which of the following is a property issue
how should we handle illegally copying copyrighted softward?
careless internet surfing is __ and is an __ mistake
human error; unintentional
Which of the following is not in the business analytics domain
in-memory computing
__ is the right to determine when and to what extent information about you can be gathered and/or communicated to others
information privacy
an order from a customer is a(n) __ for a business process
input
An/The ________ is a network of networks.
internet
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.
internet
the __ model of informed consent permits the company to collect personal information until the customer specially requests that the data not be collected
opt-out
Whereas phishing attacks are __, denial of service attacks are __
remote attacks requiring user action; remote attacks requiring no user action
________ transmission systems can have a large coverage area but their signals experience propagation delay.
satellite
networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.
software-defined
__ is pestware that users your computer as a launch pad for unsolicited email, usually advertising for products and services
spamware
keystroke loggers and screen scrapers are examples of
spyware
An electronic _________ is a website the represents a single store.
storefront
a foreign key is a primary key in another file
true
blacklisting is when everything can run except what is on the list
true
__ is a cable medium
twisted-pair
accoridng to the textbook, __ is the most widely available cable medium
twisted-pair
relational database model is based on the concept of __ dimensional tables
two
The __ approach states that an ethical action is the one that provides the most good or does the least harm
utilitarian
data __ is a repository of historical data that are organized by subject to support decision makers in the organization
warehouse