Cis exam 2
According to Gartner, more than ________ percent of the critical data in large Fortune 1000 companies' databases are inaccurate or incomplete.
25
________ is the standard for wireless technologies.
802.11
Bluetooth is another name for the ________ wireless networking standard.
802.15
Microsoft's DBMS that includes built-in report generation and reporting is called ________.
Access
________ is used to ensure the person is who he/she claims to be.
Authentication
Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority?
Blockchain
A network that spans a college or corporate facility is called a:
CAN
________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
Computer forensics
___ establishes an organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.
Data governance
What is one of the main issues associated with a traditional file environment?
Data redundancy
Which of the following is not one of the top five search engines?
In a database, a bit represents a single character, which can be a letter, a number, or another symbol.
False
Which of the following is a grouping of characters into a word, a group of words, or a complete number?
Field
In data mining, which of the following involves using a series of existing values to determine what other future values will be?
Forecasting
________ is the most popular NoSQL DBMS.
Hadoop
________ was passed in 1996 to protect medical records.
Hippa
The ________ is the world's most extensive, public communication system.
Internet
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
Internet service provider
What makes a Blockchain system possible and attractive to business firms?
Its encryption and authentication processes make it highly secure for storing many kinds of data.
The SQL ________ statement allows you to combine two different tables.
JOIN
________ includes computer viruses, worms, and Trojan horses.
Malware
Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?
Modem
An emerging non-relational database management system is called ________.
NoSQL
Which type of software is created and updated by a worldwide community of programmers and available for free?
Open source
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?
Packet switching
________ are used to track movements of products through the supply chain.
RFIDs
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
Router
All of the following are current hardware platform trends except:
SOA
which of the following is the most prominent data manipulation lancuage todau
SQL
SQL stands for ________.
Structured Query Language
________ establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent.
TCP
A ________ is a software program that mimics another program and often causes damage.
Trojan horse
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
True
Virtualization has become one of the principal technologies for promoting green computing.
True
Which of the following is the foundation technology for web services?
XML
The most commonly used authentication technique for end users is ________.
a password
Formalizing standards, rules, and procedures to ensure that the organization's general and application security controls are properly executed and enforced is a(n) ________ control.
administrative
A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.
analog
Another name for a database field is a(n) ________.
attribute
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats.
audit
A ________ is the smallest component in the computer system data hierarchy.
bit
Digital information transfer speeds are measured in ________.
bits per second
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
A ________ is a component in the computer system data hierarchy that represents an ASCII character like a letter, a number, or another symbol.
byte
Viruses differ from worms because worms ________.
can operate on their own without attaching to other computer program files
The traditional telephone system is an example of a ________ network.
circuit-switched
A company hires a third party to click on its competitor's online ads, with no intention of learning more about the advertiser or making a purchase. This is an example of ________.
click fraud
Coaxial cable is a(n) ________ for linking network components.
connection medium
elephone and computer networks are ________.
converging into a single network using shared Internet-based standards
Data cleansing, working to identify and fix incorrect data, is also called ________.
data scrubbing
A(n) ________ is a collection of data organized to serve many applications efficiently.
database
A ________ is software that enables an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs.
database management system (DBMS)
SQL injection attacks are related to ________.
databases
A ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.
denial of service
A(n) ________ signal is a discrete, binary waveform.
digital
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.
disaster recovery planning
A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.
distributed
A ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.
domain
The Domain Name System (DNS) converts ________ to ________.
domain names; IP addresses
In-memory computing relies primarily on a computer's disk drives for data storage.
false
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.
field
A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.
file
A common feild that links two differnttables ans serves as a primary key to one of these tables is calles the
foeign key
A ________ provides the link from one table to another table's primary key.
foreign key
Someone who intends to gain unauthorized access to a computer system is called a ________.
hacker
The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
information policy
An Internet Protocol (IP) address ________.
is a 32-bit number assigned to every computer on the Internet
If someone loads a program that tracks everything you type, the specific spyware is a(n) ________.
key logger
A small business that connects personal devices within a 500-meter radius is a(n) ________.
local area network
Each computer on a network must contain which of the following?
network interface device
The formal process to remove data problems such as repeating groups is called ________.
normalization
The process of streamlining data to minimize redundancy and awkard many-to-many relationsjos is called
normalization
Slicing digital messages into parcels is called ________.
packet switching
A router is a communication processor used to pass ________ through different networks.
packets of data
Although "Big Data" does not refer to a specific amount of data, it usually does involve ________.
petabytes
If someone sends you an email trying to appear as a normal site that you commonly visit to obtain unauthorized information, the person is ________.
phishing
Another term for a key field is a ________.
primary key
The field that uniquely identifies a row in a relational database table is called a ________.
primary key
Another term for a database row is a(n) ________.
record
Data ________ occurs when the same data is duplicated in multiple files of a database.
redundancy
A(n) ________ represent data as two-dimensional tables.
relational DBMS
Microsoft SQL Server is a ________ for large mainframes and midrange computers.
relational DBMS
All of the following are technologies used to analyze and manage big data except:
relational DBMS.
In relational database table for customrs, the information about a single customer resides in a single what
row
In the realtional database, the three basic operations used to develop useful what
select, project, and join
On a client/server system, most of the powerful processing is handled by the ________.
server
All of the following are cloud computing services except:
system integration services.
T1 and T3 are international ________ standards for digital communication.
telephone
TCP/IP was originally developed in the 1970s to support ________.
the Department of Defense
Fiber-optic cable is more expensive and harder to install than other physical transmission media.
true
The Internet is the largest implementation of client/server computing.
true
A(n) ________ uses the Internet to create a secure network connection.
virtual private network (VPN)
A network that spans between Montana and Wyoming is a(n) ________.
wide area network
802.11 is also known as ________.
wifi
What types of companies have been displaced by Voice over IP (VoIP)?
Long-distance telephone carriers
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms.
Sarbanes-Oxley
________ increase(s) security by validating users through a multistep process.
Two-factor authentication
A(n) ________ is the most popular method to model a database.
entity-relationship (ER) model
A ________ is a program that monitors information traveling over a network and ________.
sniffer; can be used for criminal purposes