MIS Test 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

spreadsheets

*stores data from experiment* can serve the same function as charts; used to engage students' critical and creative thinking. *one benefit of creating a spreadsheet instead of chart is that the spreadsheet's information can be used to create different types of graphs*

Five essential characteristics of cloud technology

-on demand self service -broad network access -resource pooling -rapid elasticity -measured service

Software Development Life Cycle

-planning -analysis -design -implementation -support/security

Metropolitan Area Network (MAN)

A large computer network usually spanning a city

single-user license

A license that gives you the right to install software on a single computer.

Bus Network

A network consisting of a central cable to which all network devices are attached.

Star Network

A network in which all network devices connect to one another through a single central device called the hub node.

Wired Network

A network in which computers and other devices are connected to the network via physical cables.

Ring Network

A network that connects devices in a closed loop.

Mesh Network

A network that uses multiple access points to link a series of devices that speak to each other to form a network connection across a large area.

extranet

A private electronic network that links a company with its suppliers and customers

Near Field Communication (NFC)

A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity.

What term refers to the originators exclusive legal right to reproduce, publish or sell intellectual property? a. Copyrightb. Intellectual property licensec. Public domaind. Legal right Act

A. Copyright

4. Any item or program that is available and accessible to the public without requiring permission to use and not subject to copyright is commonly referred to as ______________?a. Digital Rights management b. Public domainc. Sharewared. Native app

A. Digital rights management

The ____ is the network of all products and equipment that contain processors and can communicate with one another via the Internet, like setting your thermostat away from home. a. Internet of Things (Io T)b. Internet of Settings (Io S)c. Internet of Communications (Io C)d. Internet of Monitoring (Io M)

A. Internet of things (IoT)

This common term refers to one or more computers that act as a server and the other computers on the network request resources from the server. a. Client/server networkb. Computer/server networkc. DSL/server networkd. Cable/server network

A. client/server network

Access is a ___________ which is a collection of programs used to interact with and manage data in a database a. Database management System (DBMS)b. Database organizational System(DBOS)c. Database managerial System (DMS)d. Database institution System (DBIS)

A. database Management system (DBMS)

This device on a network connects two or more networks and directs or "routes" the flow of information along the networks. a. Routerb. Switchc. Hub d. Director

A. router

Businesses use ____________ to promote their products and services.a. Social networkingb. Private networkingc. Universal networkingd. Promotion networking

A. social networking

We refer to a collaborative website that lets users create, add to, change or delete content using their Web browsera. Wikib. Blogc. Instant messaged. Email

A. wiki

bluetooth

Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Distributed Denial of Service (DDoS)

An attack that uses many computers to perform a DoS attack.

Network Interface Card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection.

Wireless Network

Any type of computer network that is not connected by cables of any kind.

_____ computing provides and uses computer tools such as software via the Internet. Some characteristics of this technology include, network access, resource pooling, and on demand self service.a. Privateb. Cloudc. Sharewared. Publicized

B. Cloud

This term refers to the set of rules against causing harm to others, misuse or unauthorized access of another person's files or data, protection of intellectual property, stealing and software privacy. a. Code of literacyb. Code of Conductc. Code of Rulesd. Code of plagarism

B. Code of conduct

A telecommunications company that sells Internet access, like Suddenlink, is know as a(n) ___________? a. Internet Provider Services (IPS)b. Internet Service Provider (ISP)c. Internet Modulator (IM)d. Internet Hub Station (HIS)

B. Internet service provider (ISP)

What do you call the circuit board that connects a computer to a wired or wireless network a. Network Internet Card b. Network Interface Cardc. Network Interchange Cardd. Network Connection Card

B. Network interface card

When using a database, ________ show how data in one table relates to the data in another table. a. Joiningb. Relationshipsc. Relationsd. connections

B. Relationships

This involves the sale of goods and services to the general public. a. Consumer to consumer (C2C)b. Business to consumer (B3C)c. Business to business (B2B)d. None of the these

B. business to consumer (B2C)

An unauthorized collection or distribution of data is considered a _____ breach.a. Informationb. Datac. Criminald. public

B. data

What common term below refers to protected copyright laws that refers to unique and original works, such as ideas, inventions, art, writings processes, product name and logos? a. Copyrightb. Intellectual property (IP)c. Digital copyright lawd. Intellectual materials (IM)

B. intellectual property

This commonly known term refers to the technological use of logic and prior experience to simulate human intelligence. a. Chatbotb. Machine learningc. Artificial intelligenced. Logical intelligence

C. Artificial intelligence

This system supports sales, service, marketing and many other departments in a company. a. Human Resourcesb. Customer Servicec. Customer Relationship Management systemd. Customer Sales support

C. Customer relationship management system

The columns in a database is commonly referred to as a(n) _______. a. Recordb. Itemc. Fieldd. Data

C. Field

Each row in a database table is called a _______.a. Rowb. Itemc. Recordd. field

C. Record

_____ ethics is the set of legal and moral guidelines that govern the use of technologies including computers, mobile devices, information systems and more.a. Analogb. Digitizedc. Digitald. Streaming

C. digital

______ communications is the transmittal of data, instructions and information from one computer or mobile device to another, often via the Internet. a. Analogb. Digitizedc. Digitald. Binary

C. digital

5. Updates to software that address a single issue are called __________? a. Stickersb. Bandagesc. Patchesd. Service pack

C. patches

What term below refers to voice communications over the Internet and is sometimes called Internet telephony. a. Multimedia messagingb. Voice-to-textc. Voice over Internet Protocol (VoIP)d. Webinar

C. voice over internet protocol (VoIP)

Virtual Private Network (VPN)

Companies can establish direct private network links among themselves or create private, secure Internet access, in effect a "private tunnel" within the Internet

Local Area Network (LAN)

Connects a group of computers in close proximity, such as in an office building, school, or home

Wide Area Network (WAN)

Connects devices that are not in close proximity

What is a set of coded instructions written for a computer or mobile device such as an operating system or application? a. Softwareb. Program c. "App" short for Application d. All of the above

D. all of the above

What popular term, regarding digital communication, refers to the rules of Internet etiquette?a. Mannersb. Politenessc. Etiquette protocolsd. Netiquette

D. netiquette

Flaming

Online fights using electronic messages with angry and vulgar language.

back-end database

Part of a split database that contains table objects and is stored on a file server that all users can access.

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

Acceptable Use Policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

Carbon Copy (CC)

Sends a message to additional recipients.

digital ethics

The set of legal and moral guidelines that govern the use of technology, including computers, mobile devices, information systems, databases, and more.

artificial intelligence (AI)

The technological use of logic and prior experience to simulate human intelligence.

Bandwidth

Transmission capacity measure by bit rate

Cable modem DSL modem

Which of the following devices are most commonly used to connect a LAN to an ISP for broadband services? (Select TWO.)

Internet Service Provider (ISP)

a company that provides access to the internet for a monthly fee

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

Network Attached Storage (NAS)

a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network

unique selling proposition (USP)

a strategy of differentiating a product by communicating its unique attributes; often becomes the common theme or slogan in the entire advertising campaign

This communication device connects a communication channel like the Internet to a sending or receiving device like a computer. a. Modem b. Hub c. Terminal keyboard d. Switch panel

a. modem

Google Docs is an excellent example of Cloud consumers most commonly interact with _______ which is software that is distributed online.a. Software as a Service (SaaS)b. Platform as a Service(PaaS)c. Infrastructure as a Service (IaaS)d. Cloud as a Service (CaaS)

a. software as a service (SaaS)

User Experience (UX)

all aspects of a person's interaction with a software application, including actions, responses, perceptions, and feelings

site license

allows an organization to provide access to as many users as they want, either by individual installations or providing network access or internet passwords

Bcc (blind carbon copy)

allows you to email two or more people without anyone being able to see the person who was the Bcc

Structured Query Language (SQL)

an international standard language for processing a database

e-business

any kind of business activity conducted online

how to secure a network?

authentication firewall encryption

A _______ is a collection of data organized in a way that allows you to access, retrieve, edit and create reports of the data. a. Datab. Spreadsheetsc. Databased. Data points

c. Database

6. The set of activities used to build a program is called the ______________.a. Software activites setb. Software program phasesc. Software Development Life Cycled. Software blue print

c. software development life cyce

Database

collection of data organized in a way that allows you to access, retrieve and create reports of that data

Database Management System (DBMS)

collection of programs used to interact with and manage data in the database

modem

communications device that connects a communications channel to a device

front-end database

contains the objects needed to interact with data, but not the tables where the record values reside

3 C's of commerce

content, community, context

router

decide that connects two or more networks

object-oriented programming

designing a program by discovering objects, their properties, and their relationships

private cloud

does not use the internet

Digital Citizenship

ethical, legal, and productive use of technology

types of free programs

freeware, shareware, public domain

digital literacy

having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies

wireframes

indicate how a user gets from one area of the program to another

big data

large and complex data sources that defy traditional data processing methods

public cloud

multiple customers use the same, internet connected cloud

types of updates to software

patches, service packs, upgrades

multiple-user license

priced per copy and allows the allocated number of copies to be used simultaneously

troubleshooting tools

process managers system information lists auditing tools patch finders restorers

e-commerce

process of conducting buy and sell transactions on an electronic network

Business Intelligence (BI)

processes and technologies used for data analysis

programs and apps by category

productivity graphics and media personal interest communications security file, disk, and system

Personal Area Network (PAN)

provides communication for devices owned by a single user that work over a short distance

Cloud Computing

providing and using computer tools, such as software, via the internet

body area network

small, lightweight biosensors implanted in the body

Malware

software that is intended to damage or disable computers and computer systems.

IrDA (Infrared Data Association)

standard to transmit data wirelessly to each other via infrared (IR) light waves.

network

system of two or more devices linked by wires, cables, or a telecommunications system

Digital Rights Management (DRM)

technologies that let copyright owners control the level of access or use allowed for a copyrighted work, such as limiting the number of times a song can be copied

Netiquette

the correct or acceptable way of communicating on the Internet.

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

hub

transfers all data to all devices

switch

transfers data only to the intended recipient

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

Social Engineering

using deception to obtain unauthorized access to information resources


Kaugnay na mga set ng pag-aaral

Introduction to Quadratic Functions Assignment

View Set

AMSCO Period 7 Multiple Choice Questions

View Set

The Time Value of Money (TRUE/FALSE)

View Set

Clinical Concepts 3 - Anemia/Sickle Cell Anemia

View Set

Renaissance to Modern Art History Exam Chapters 33, 34,35

View Set

MGT 331 Ch. 4 Ethics and Social Responsibility

View Set