MIS Test 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The most commonly used authentication technique for end users is ________.

A Password

A​ ________ is software that enables an organization to centralize​ data, manage them​ efficiently, and provide access to the stored data by application programs.

database management system​ (DBMS)

SQL injection attacks are related to​ ________.

databases

A DBMS has a data __________ capability that is used to specify the structure of the content of the database.

definition

The size of a nanotube is about​ ________ thinner than a human hair.

10,000 times

_______ is the standard for wireless technologies.

802.11​

Bluetooth is another name for the​ ________ wireless networking standard.

802.15

Gipsi runs a manufacturing company. She recently invested in​ ________ computing devices because she wanted to improve productivity by delivering information to workers without requiring them to interrupt their tasks

wearable

A network that spans between Montana and Wyoming is​ a(n) ________.

wide area network

A(n) ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

denial of service

A(n) ________ signal is a​ discrete, binary waveform.

digital

MasterCard having a duplicate computer center in multiple cities is an example of​ ________ in case operations at one location are disrupted.

disaster recovery planning

A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.

enterprise software application

Competitor​ firms' IT services is​ a(n) ________ of the competitive forces model for IT infrastructure.

external part

According to​ Moore's Law​ (1965), the ratio of price to performance has​ ________.

fallen

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A.

field

A​ ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.

file

A​ ________ provides the link from one table to another​ table's primary key.

foreign key

Microsoft's Azure ________ provides a set of development tools and IT services that enable users to build new applications and run them in the cloud on their data center infrastructure.

platform as a service​ (PaaS)

Another term for a key field is a​ ________.

primary key

The field that uniquely identifies a row in a relational database table is called a​ ________.

primary key

Infrastructure as a service​ (IaaS) provides​ ________.

processing, storage, and networking resource

A positive regarding cloud computing includes​ ________.

rapid elasticity

The most popular type of database today for PC as well for larger computers and mainframe is _________ database.

rational

Another term for a database row is​ a(n) ________.

record

Microsoft SQL Server is a​ ________ for large mainframes and midrange computers.

relational DBMS

On a​ client/server system, most of the powerful processing is handled by the​ ________.

server

A​ ________ is a program that monitors information traveling over a network and​ ________.

sniffer; can be used for criminal purposes

T1 and T3 are international​ ________ standards for digital communication.

telephone

​TCP/IP was originally developed in the 1970s to support​ ________.

the Department of Defense

A​ ________ is a software program that mimics another program and often causes damage.

trojan horse

​A(n) ________ uses the Internet to create a secure network connection.

virtual private network (VPN)

Setting up a system so that it is not restricted by physical configuration or geographic location is an example of​ ________.

virtualization

________ are data files used to identify and protect online transactions using a trusted third party

Digital Certificates

An information systems​ ________ examines a​ firm's overall security environment and determines if the organization is properly prepared to address threats.

audit

Coaxial cable is​ a(n) ________ for linking network components.

connection medium

Viruses differ from worms because worms​ ________.

can operate on their own without attaching to other computer program files

Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared​ data, serves up web​ pages, or manages network activities is called​ ________ .

client/server

An Internet Protocol​ (IP) address​ ________.

is a​ 32-bit number assigned to every computer on the Internet

If someone loads a program that tracks everything you​ type, the specific spyware is a​ ________.

key logger

A small business that connects personal devices within a​ 500-meter radius is​ a(n) ________.

local area network

What types of companies have been displaced by Voice over IP​ (VoIP)?

long-distance telephone carriers

The typical computing configuration in 1960 was​ ________.

mainframe

________ includes computer​ viruses, worms, and Trojan horses.

malware

The formal process to remove data problems such as repeating groups is called​ ________.

normalization

Slicing digital messages into parcels is called​ ________.

packet switching

A router is a communications processer used to pass​ ________ through different networks

packets of data

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized​ information, they are​ ________.

phishing

The​ ________ is the​ world's most​ extensive, public communication system.

Internet

​A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

Internet service provider

What makes a Blockchain system possible and attractive to business​ firms?

Its encryption and authentication processes make it highly secure for storing many kinds of data.

The SQL​ ________ statement allows you to combine two different tables.

JOIN

802.11 is also known as​ ________

Wi-Fi

Over 80 percent of all PCs use which OS?

Windows

​________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data.

XML

Another name for a database field is​ a(n) ________.

attribute

Microsoft's DBMS that includes​ built-in report generation and reporting is called​ ________.

Access

Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.

Administrative

________ is used to ensure the person is who he/she claims to be.

Authentication

Using your handprint to access a safe deposit box is an example of ________ authentication.

Biometric

Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a​ peer-to-peer network nearly instantaneously without a central​ authority?

Blockchain

A company hires a third party to click on its competitor's online ads, with no intention of learning more about the advertiser or making a purchase. This is an example of ________.

Click Fraud

​________ refers to a model of computing that provides access to a shared pool of computing resources over the Internet.

Cloud

________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

Computer Forensics

Which of the following options is NOT part of the competitive forces model for IT infrastructure​ investment?

Current supply like your​ firm's services

IS security firewalls are an example of a ________.

Gatekeeper

________ was passed in 1996 to protect medical records.

HIPPA

Which of the following options is a page description language for generating Web pages​ (e.g., text, dynamic​ links)?

HTML

An open source framework for parallel processing across inexpensive computers is called________

Hadoop

​________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.

In-memory computing

A(n) ________ is an important resource for an organization to​ create, illustrating rules on how data is organized and who has access to what data.

Information policy

A(n) ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems applications.

Information technology infrastructure

An emerging​ non-relational database management system is called​ ________.

NoSQL

________ is free software produced by a community of several hundred thousand programmers around the world.

Open source

Regarding the IT infrastructure​ ecosystem, data management includes​ ________.

Oracle, SQL​ Server, and MySQL

​________ are used to track movements of products through the supply chain.

RFIDs

________ is a method for encrypting network traffic on the web.

SSL

In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.

Sarbanes-Oaxley

Google Apps are an example of​ ________.

Software as a service​ (SaaS)

SQL stands for​ ________.

Structured Query Language

​________ services ensure that a​ firm's new infrastructure works with the​ firm's older systems and that all parts of the​ firm's infrastructure work together.

System integration

​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent.

TCP

A unified threat management system does NOT include a(n) ________.

Token

Public key encryption uses ________ key(s).

Two

________ increase(s) security by validating users through a multistep process.

Two Step Authentification

The Law of Mass Digital Storage suggests that the​ ________.

amount of digital information doubles each year

​A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.

analog

A ________ is the smallest component in the computer system data hierarchy..

bit

Digital information transfer speeds are measured in​ ________.

bits per second

A ​ ________ is a component in the computer system data hierarchy that represents an ASCII character like a​ letter, a​ number, or another symbol.

byte

A cloud​ ________.

can be private or public

Data​ cleansing, working to identify and fix incorrect​ data, is also called​ ________.

data scrubbing

​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the​ globe, with special​ time-keeping tools to synchronize the data and ensure the data are always consistent.

distributed

A​ ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.

domain

The Domain Name System​ (DNS) converts​ ________ to​ ________.

domain​ names; IP addresses

Someone who intends to gain unauthorized access to a computer system is considered to be a​ ________.

hacker

An IT infrastructure includes​ ________.

hardware, software, and services

The number of cycles per second that can be sent through a network medium is calculated in​ ________.

hertz

Your​ firm's business strategy is​ a(n) ________ of the competitive forces model for IT infrastructure.

internal part


Kaugnay na mga set ng pag-aaral

IPAP 3-17 Pharm 2 Mod 1-1- Skeletal Muscle Relaxants

View Set

Chapter 27; Cardiovascular and Lymphatics

View Set

MN Chapter 28 The child with gastrointestinal condition

View Set

ResearchMethods in Psychology Exam 2

View Set

Chapter 5: Antigen Recognition by T Lymphocytes

View Set

Cells in Organisms quiz 3 review

View Set

Chapter 17: Drug Therapy for Heart Failure

View Set