MIS250 EXAM 2 WSU

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

_____ provide data, voice, and video connectivity to employees, customers, and suppliers.

Telecommunication services

Business managers, working with information system specialist, should estimate all the following components of a risk assessment EXCEPT ______.

The identity of the organization that created the malware

Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are called _______.

Wireless Sensor Networks (WSNs)

Independent computer programs that copy themselves from one computer to others over a network are called _____.

Worms

Data which are not visible to the average user are called​ ________.

ambient data

A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.

assessment

The method of slicing digital messages into​ pieces, sending the pieces over different communication​ media, and then reassembling the pieces is called​ ________.

packet switching

Hackers flooding a network server with many thousands of false communication requests is called​ ________.

A denial-of-service attack

A model of computing that provides a shared pool of computing resources for an organization to use over the internet is called _____

Cloud computing

A firms ______ should include an awareness of computer forensics

Contingency planning process

A(n) ______ is a database that stores historic and current data for the use of decision makers in an organization

Data Warehouse

The process of detecting and correcting errors in a database is called _______.

Data cleansing

Finding hidden patterns and relationships in large databases and inferring rules from them to predict future behavior is called ______.

Data mining

________ operate over existing telephone lines to carry data, voice, and video.

Digital Subscriber Line (DSL) Technologies

All the following are eras in IT infrastructure evolution except the _____

Disruptive Technology Era

______ converts domain names to IP addresses

Domain Name System (DNS)

A person, place, or thing that is stored in a database is called a(n) _____.

Entity

_____ is a lightweight operating system for cloud computing.

Google Chrome OS

The law that requires financial institutions to ensure confidentially of customer data is called the _______.

Gramm-Leach-Bliley Act

An open-source framework for parallel processing across inexpensive computers is called ______.

Hadoop

All the following are important questions about IT governance EXCEPT _____.

How data should be stored in a database

A new version of IP addressing, which contains 128-bit addresses, is called ______.

IPv6

_____ are used reliably and securely to handle high transaction volumes, analyze huge data sets, and support large workloads in cloud data centers.

Mainframe computers

A network that spans a city is called a(n) ______.

Metropolitan Area Network (MAN)

_____ states that the number of components that a computer chip can hold doubles every two years

Moore's Law

________ use a more flexible data model and are designed for big data.

Non-relational database management systems

Free software produced by a team of hundreds of thousands of programmers around the world is called _____.

Open Source Software

A communication processor used to direct packets of data through different networks is called a ______.

Router

The network operating system (NOS) _______.

Routes and manages network traffic

A type of malware that takes advantage of poorly coded web applications is called ______.

SQL injection attacks

The law that applies to publicly traded companies and is designed to protect investors is called the _____.

Sarbanes-Oxley Act

The ability of a computer, product, or system to expand to serve more users without breaking down is called _____.

Scalability

In relational databases, the ______ operation creates a subset of records in the file that meet stated criteria.

Select

All the following are total cost of ownership infrastructure components EXCEPT _____.

Staff salaries

All the following are parts of the Transmission Control Protocol/Internet Protocol Reference Model EXCEPT ______ layer.

Switching

All the following are methods of authentication EXCEPT _______.

TCP/IP

All the following are wearable computing devices EXCEPT _____

Tablet Computers

The range of frequencies that can be accommodated on a telecommunications channel is called _______.

Bandwidth

______ is a popular name for a networking standard useful for creating small personal-area networks

Bluetooth

The widespread use of personal devices in the workplace and school is often referred to as _____.

Bring your own device (BYOD)

Data is considered to be​ ________ when the same attribute has different values in different systems.

Inconsistent

_____ support(s) a firms website and include(s) web hosting services, routers, and cabling or wireless equipment.

Internet Platforms

________ feature(s) monitor the network at its most vulnerable points.

Intrusion detection systems

_____ is an object-oriented programming language that is processor and operating system independent.

Java

______ systems are older transaction processing systems, usually created for mainframes

Legacy

The leading operating system on servers, mainframe computers, and supercomputers is _____.

Linux

All the following are physical transmission media EXCEPT ______.

Power lines

The unique identifier for all data in a table is called the ______.

Primary key

The coupling of files used to store information and the application program that updates and maintains those files is called _____.

Program-data dependence

A form of encryption that uses two keys is called ________.

Public key encryption

A type of computer that could be in many states at once is called a _____.

Quantum Computer

_______ is very useful for inventory and supply chain management.

Radio Frequency Identification (RFID)

When thinking about security, controls_______.

Refers to policies and procedures that ensure the safety of an organizations assets.

The decision to purchase or rent IT assets is called the ______ decision.

Rent-versus-buy

All the following are essential characteristics of the cloud EXCEPT _____.

Web Beacons

All the following are major internet services EXCEPT _______.

Web Beacons

All the following are types of information that are obtained from data mining EXCEPT ______.

Web beacons

A set of loosely coupled software components that exchange information with one another using universal standards and languages are called​ _____.

Web services

A new family of standards developed to deal with the fact that people in remote areas do not have access to WIFI is called​ ________.

WiMAX

The career field that deals with collection and examination of computer data for legal evidence is called​ ________.

computer forensics

A(n) ________ is a structured survey of the accuracy and level of completeness of data in an information system

data quality audit

A(n) ______ enables an organization to centrally manage and organize data.

database management system

A(n) ______ is a discrete binary waveform used for transmission of data.

digital signal

A grouping of characters into a word or group of words is called​ a(n) ________.

field

A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.

firewall

_______ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.

in-memory computing

A(n) _________ specifies the rules of an organization for sharing and disseminating information

information policy

All the following are general controls EXCEPT _____ controls.

input


Kaugnay na mga set ng pag-aaral

European Exploration and Conquest (1450-1650)

View Set

The Digestive System: Anatomy Review

View Set

Oncology NCLEX practice questions

View Set

Chapter 14 - Understanding Accounting and Financial Information

View Set

HRES3360 Training and Development

View Set