MIS Test 2
The most commonly used authentication technique for end users is ________.
A Password
A ________ is software that enables an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs.
database management system (DBMS)
SQL injection attacks are related to ________.
databases
A DBMS has a data __________ capability that is used to specify the structure of the content of the database.
definition
The size of a nanotube is about ________ thinner than a human hair.
10,000 times
_______ is the standard for wireless technologies.
802.11
Bluetooth is another name for the ________ wireless networking standard.
802.15
Gipsi runs a manufacturing company. She recently invested in ________ computing devices because she wanted to improve productivity by delivering information to workers without requiring them to interrupt their tasks
wearable
A network that spans between Montana and Wyoming is a(n) ________.
wide area network
A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
denial of service
A(n) ________ signal is a discrete, binary waveform.
digital
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.
disaster recovery planning
A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.
enterprise software application
Competitor firms' IT services is a(n) ________ of the competitive forces model for IT infrastructure.
external part
According to Moore's Law (1965), the ratio of price to performance has ________.
fallen
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.
field
A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.
file
A ________ provides the link from one table to another table's primary key.
foreign key
Microsoft's Azure ________ provides a set of development tools and IT services that enable users to build new applications and run them in the cloud on their data center infrastructure.
platform as a service (PaaS)
Another term for a key field is a ________.
primary key
The field that uniquely identifies a row in a relational database table is called a ________.
primary key
Infrastructure as a service (IaaS) provides ________.
processing, storage, and networking resource
A positive regarding cloud computing includes ________.
rapid elasticity
The most popular type of database today for PC as well for larger computers and mainframe is _________ database.
rational
Another term for a database row is a(n) ________.
record
Microsoft SQL Server is a ________ for large mainframes and midrange computers.
relational DBMS
On a client/server system, most of the powerful processing is handled by the ________.
server
A ________ is a program that monitors information traveling over a network and ________.
sniffer; can be used for criminal purposes
T1 and T3 are international ________ standards for digital communication.
telephone
TCP/IP was originally developed in the 1970s to support ________.
the Department of Defense
A ________ is a software program that mimics another program and often causes damage.
trojan horse
A(n) ________ uses the Internet to create a secure network connection.
virtual private network (VPN)
Setting up a system so that it is not restricted by physical configuration or geographic location is an example of ________.
virtualization
________ are data files used to identify and protect online transactions using a trusted third party
Digital Certificates
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.
audit
Coaxial cable is a(n) ________ for linking network components.
connection medium
Viruses differ from worms because worms ________.
can operate on their own without attaching to other computer program files
Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared data, serves up web pages, or manages network activities is called ________ .
client/server
An Internet Protocol (IP) address ________.
is a 32-bit number assigned to every computer on the Internet
If someone loads a program that tracks everything you type, the specific spyware is a ________.
key logger
A small business that connects personal devices within a 500-meter radius is a(n) ________.
local area network
What types of companies have been displaced by Voice over IP (VoIP)?
long-distance telephone carriers
The typical computing configuration in 1960 was ________.
mainframe
________ includes computer viruses, worms, and Trojan horses.
malware
The formal process to remove data problems such as repeating groups is called ________.
normalization
Slicing digital messages into parcels is called ________.
packet switching
A router is a communications processer used to pass ________ through different networks
packets of data
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ________.
phishing
The ________ is the world's most extensive, public communication system.
Internet
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
Internet service provider
What makes a Blockchain system possible and attractive to business firms?
Its encryption and authentication processes make it highly secure for storing many kinds of data.
The SQL ________ statement allows you to combine two different tables.
JOIN
802.11 is also known as ________
Wi-Fi
Over 80 percent of all PCs use which OS?
Windows
________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data.
XML
Another name for a database field is a(n) ________.
attribute
Microsoft's DBMS that includes built-in report generation and reporting is called ________.
Access
Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.
Administrative
________ is used to ensure the person is who he/she claims to be.
Authentication
Using your handprint to access a safe deposit box is an example of ________ authentication.
Biometric
Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a peer-to-peer network nearly instantaneously without a central authority?
Blockchain
A company hires a third party to click on its competitor's online ads, with no intention of learning more about the advertiser or making a purchase. This is an example of ________.
Click Fraud
________ refers to a model of computing that provides access to a shared pool of computing resources over the Internet.
Cloud
________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
Computer Forensics
Which of the following options is NOT part of the competitive forces model for IT infrastructure investment?
Current supply like your firm's services
IS security firewalls are an example of a ________.
Gatekeeper
________ was passed in 1996 to protect medical records.
HIPPA
Which of the following options is a page description language for generating Web pages (e.g., text, dynamic links)?
HTML
An open source framework for parallel processing across inexpensive computers is called________
Hadoop
________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
In-memory computing
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
Information policy
A(n) ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems applications.
Information technology infrastructure
An emerging non-relational database management system is called ________.
NoSQL
________ is free software produced by a community of several hundred thousand programmers around the world.
Open source
Regarding the IT infrastructure ecosystem, data management includes ________.
Oracle, SQL Server, and MySQL
________ are used to track movements of products through the supply chain.
RFIDs
________ is a method for encrypting network traffic on the web.
SSL
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oaxley
Google Apps are an example of ________.
Software as a service (SaaS)
SQL stands for ________.
Structured Query Language
________ services ensure that a firm's new infrastructure works with the firm's older systems and that all parts of the firm's infrastructure work together.
System integration
________ establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent.
TCP
A unified threat management system does NOT include a(n) ________.
Token
Public key encryption uses ________ key(s).
Two
________ increase(s) security by validating users through a multistep process.
Two Step Authentification
The Law of Mass Digital Storage suggests that the ________.
amount of digital information doubles each year
A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.
analog
A ________ is the smallest component in the computer system data hierarchy..
bit
Digital information transfer speeds are measured in ________.
bits per second
A ________ is a component in the computer system data hierarchy that represents an ASCII character like a letter, a number, or another symbol.
byte
A cloud ________.
can be private or public
Data cleansing, working to identify and fix incorrect data, is also called ________.
data scrubbing
A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.
distributed
A ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.
domain
The Domain Name System (DNS) converts ________ to ________.
domain names; IP addresses
Someone who intends to gain unauthorized access to a computer system is considered to be a ________.
hacker
An IT infrastructure includes ________.
hardware, software, and services
The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz
Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part