Exam 2 BAIS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The WiMax standard can transmit up to a distance of approximately: 30 miles. 500 meters. 5 miles. 30 meters. 70 miles.

30 miles

What are the four layers of the TCP/IP reference model? Application, Hardware, Internet, and Network Interface Physical, Application, Internet, and Network Interface Physical, Application, Transport, and Network Interface Application, Transport, Internet, and Network Interface Software, Hardware, Network Interface, Internet

Application, Transport, Internet, and Network Interface

OLAP is used to quickly find answers to ad hoc questions. true or false

true

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with: a crow's foot. a crow's foot preceded by two short marks. a crow's foot topped by a short mark. one short mark. two short marks.

two short marks

Which of the following would you use to find patterns in user interaction data recorded by web servers? Web server mining Web usage mining Web structure mining Web content mining Web protocol mining

web usage mining

The 802.11 set of standards is known as: Wi-Fi. WAN. WLAN. WiMax. WSN.

wi-fi

The use of multiple computers linked by a communications network for processing is called: supercomputing. network computing. decentralized computing. distributed processing. centralized processing.

Distributed processing

Which of the following is not a type of input device? Trackball Digital scanner Sensor Flat panel (LCD) display screen Keyboard

Flat panel (LCD) display screen

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? Peer-to-peer network WAN SAN MAN Domain-based LAN

Peer-to-peer network

Which of the following statements about RFID is not true? RFIDs use an antenna to transmit data. RFID tags and antennas come in a variety of shapes and sizes. Microchips embedded in RFIDs are used to store data. RFIDs transmit only over a short range. RFIDs require line-of-sight contact to be read.

RFIDs require line-of-sight contact to be read.

Which of the following is the most prominent data manipulation language today? NoSQL SQL Access Hadoop DB2

SQL

All of the following are tools or technologies that can be used to extract information from unstructured data sets except: text mining. a nonrelational DBMS. Hadoop. SQL queries. sentiment analysis software.

SQL queries

Which of the following types of software manages the resources and activities of a computer? Network software Application software System software Data Management software Web services software

System software

Which of the following can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology implementation? Cost benefit analysis TCO model Break-even point ROI model SLA

TCO model

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: baud. gigaflops. Hertz. RPMs. bps.

bps

Which of the following is used to predict when a computer hardware system becomes saturated? TCO Virtualization Capacity planning SLAs Localization

capacity planning

All of the following are traditional storage technologies except: magnetic tape. storage networks. optical drives. magnetic disks. cloud computing.

cloud computing

Which of the following is a worm that uses flaws in Windows software to take over a computer remotely? Cryptolocker Zeus ILOVEYOU Conficker Sasser

conficker

Which of the following focuses primarily on the technical issues of keeping systems up and running? An AUP Security policies Disaster recovery planning Business continuity planning An information systems audit

disaster recovery plan

In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. private cloud quantum hybrid cloud grid scalable

hybrid cloud

A table that links two tables that have a many-to-many relationship is often called a(n): derived table. intersection relation. entity-relationship table. foreign table. derived relation.

intersection relation

A field that uniquely identifies each record so that the record can be retrieved, updated, or sorted, is known as the: key field. primary field. foreign key. identifying field. database key.

key feild

Most computer viruses deliver a: worm. keylogger. drive-by download. Trojan horse. payload.

payload

Which of the following harnesses the ability to be in multiple states simultaneously to dramatically increase processing power? Edge computing Grid computing Quantum computing Utility computing Cloud computing

quantum computing

Relational databases organize data into two-dimensional tables called: relations fields attributes tuples key field

relations

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address? Router Switch NIC Hub

router

Which of the following Internet services enables remote logon onto another computer? Telnet Email Instant messaging FTP Newsgroups

telnet

Your company, an online discount pet supply store, has calculated that a loss of Internet connectivity for 3 hours results in a potential loss of $2,000 to $3,000 and that there is a 50% chance of this occurring each year. What is the annual expected loss from this exposure? $1,500 $2,500 $1,250 $1,000 $500

$1,500

Which of the following statements about 5G is true? 5G is not currently being developed by large Internet network providers. 5G is designed to support the transmission of data in the gigabit range. 5G is built on the foundation of 4G networks. 5G technology is designed primarily for the delivery of audio. 5G will have longer transmission delays.

5G is designed to support the transmission of data in the gigabit range.

Which of the following statements about Big Data is not true? Incorrect answer: Big Data can reveal more patterns and interesting relationships than smaller data sets. Big Data refers solely to data in the petabyte range. Big Data is characterized by the 3Vs: volume, variety, and velocity. Big Data is finding many uses in the public sector. Big Data are produced in much larger quantities and much more rapidly than traditional data.

Big Data refers solely to data in the petabyte range.

Which of the following statements about wireless security is not true? Wi-Fi networks are susceptible to hacking by eavesdroppers. Intruders can force a user's NIC to associate with a rogue access point. LANs using the 802.11 standard can be easily penetrated by outsiders. Bluetooth is the only wireless technology that is not susceptible to hacking. War driving involves eavesdroppers driving by buildings or parking outside and trying to intercept a wireless network.

Bluetooth is the only wireless technology that is not susceptible to hacking.

Which of the following statements about edge computing is not true? Edge computing reduces the amount of data flowing between local computers and devices and the central cloud data center. Edge computing is helpful for online gaming services firms. Edge computing is a method of optimizing cloud computing systems. Edge computing is a key technology for smart cities. Edge computing increases delays in the transmitting and processing of data.

Edge computing increases delays in the transmitting and processing of data.

A grouping of characters into a word, a group of words, or a complete number is called a field. ture or false

False

Implementing a web interface for an organization's internal database usually requires substantial changes to be made to the database. True or False

False

Which of the following best describes the importance of creating an accurate data model for your business's database? It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. It is unnecessary, as a well-designed database should not require one. It is essential, as table relationships cannot be created without an accurate data model. It is somewhat important, as the type of data model will define what kinds of data will be stored. It is not essential, as the data model itself is modified by the database continuously.

It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

Which of the following statements about botnets is not true? IoT devices can be controlled by botnets. Botnets are often used to launch phishing campaigns. Botnets are often used to perpetrate DDoS attacks. Unsolicited spam email is often delivered by botnets. It is not possible to make a smartphone part of a botnet.

It is not possible to make a smartphone part of a botnet.

Which of the following statements is not true about cloud computing? It removes the concern about data and systems security for businesses. It relies primarily on the Internet as the platform for delivering services to users. It allows smaller firms to use resources previously unaffordable. Charges for cloud resources are based on resources actually used. It is the fastest-growing form of computing.

It removes the concern about data and systems security for businesses.

Which of the following statements about Internet security vulnerabilities is not true? Sharing files over a P2P network can expose information on a corporate computer to outsiders. Employees can pose a security threat. Email attachments can serve as a springboard for malicious software. Large public networks, such as the Internet, are less vulnerable than internal networks. Instant messaging can provide hackers access to an otherwise secure network.

Large public networks, such as the Internet, are less vulnerable than internal networks.

Mobile game developer Yile Technology chose which of the following to store its game's customer profile data? Microsoft Access Microsoft SQL Server Amazon Web Service's Simple DB MongoDB Atlas Oracle Database

MongoDB Atlas

Which of the following is an integrated circuit to which two or more processors have been attached, and which features enhanced performance and reduced power consumption? Hybrid processor Virtualized processor Multicore processor Scalable processor Edge processor

Multicore processor

Which of the following best illustrates the relationship between entities and attributes? The entity CUSTOMER with the attribute ADDRESS The entity ADDRESS with the attribute CUSTOMER The entity CUSTOMER with the attribute PRODUCT The entity PRODUCT with the attribute CUSTOMER The entity PRODUCT with the attribute PURCHASE

The entity CUSTOMER with the attribute ADDRESS

What is the purpose of referential integrity rules in a relational database? They minimize redundant data elements. They ensure that relationships between coupled tables remain consistent. They ensure that the attributes for a particular entity apply only to that entity. They detect and correct data in the database that are incorrect. They organize the data in a database in a hierarchy.

They ensure that relationships between coupled tables remain consistent.

Companies that own Internet backbone networks are called: Tier 1 ISPs. Transcintinental ISPs. Tier 3 ISPs. Tier 2 ISPs. IXPs.

Tier 1 ISPs

Which of the following deals with the "last mile of service" and provides Internet access to consumers and businesses? IXPs Tier 1 ISPs Tier 3 ISPs Regional ISPs Tier 2 ISPs

Tier 3 ISPs

Which of the following is an example of a legacy system? Web services running on a cloud computing platform Scalable grid computing system Quantum computing system Transaction processing system running on a mainframe MDM software

Transaction processing system running on a mainframe

The traditional telephone system is an example of a ________ network. peer-to-peer client/server packet-switched wireless circuit-switched

circuit-switched

The select operation: specifies the content of the database. identifies the table from which the columns will be selected. creates a subset consisting of columns in a table. creates a subset consisting of all records in the file that meet stated criteria. combines relational tables to provide the user with more information than is otherwise available.

creates a subset consisting of all records in the file that meet stated criteria.

Which of the following has been the traditional tool for analyzing corporate data for the past three decades? Data mart Hadoop Data lake Data warehouse OLAP

data warehouse

A schematic that describes the manner in which two tables are related to one another in a database is called a(n): intersection relationship diagram. data definition diagram. referential integrity diagram. data dictionary. entity-relationship diagram.

entity-relationship diagram.

In the context of data mining, the term sequences refers to: occurrences linked to a single event. patterns that describe a group to which an item belongs. forecasts as to the future values of various variables events linked over time. undiscovered groupings.

events linked over time.

Which of the following is an example of a company whose business model is based on access to large databases through the web? Facebook (Meta) Microsoft Fortune Gartner IBM

facebook (Meta)

A cracker is an ethical hacker hired by an organization to test the organization's security measures. true or false

false

A data governance policy specifies the procedures and rules for defining the content of corporate databases. Incorrect answer: true or false

false

A data warehouse is well suited for organizing and analyzing Big Data. true or false

false

Apple's iOS operating system is the mobile platform targeted by most hackers. true or false

false

Computer networks are based on the same principles as traditional telephone networks. true or false

false

Digital resiliency focuses solely on the resiliency of the IT function. true or false

false

Equipping employees with mobile devices reduces IT infrastructure integration and technical support costs. true or false

false

Fiber-optic cable is less expensive and easier to install than other physical transmission media. true or false

false

Hadoop is particularly useful in analyzing smaller data sets of Big Data. true or false

false

Internet2 is an advanced networking consortium focused on the development of the metaverse. true or false

false

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. true or false

false

Only computers behind a corporate firewall are trusted by default when using a zero-trust framework. true or false

false

Software used to create an invoice is an example of systems software. true or false

false

Text mining is the discovery of useful patterns on the web. True or false

false

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? Twisted wire TCP/IP Local area network DSL Modem

modem

Which of the following is not an essential characteristic of cloud computing, as defined by the US National Institute of Standards and Technology (NIST)? Ubiquitous network access Measured service On-demand self-service Rapid elasticity

open-source software

________ provides users with free access to its program code. A web service An app Office software Cloud-based software Open-source software

open-source software

DSL (Digital subscriber line): operates over coaxial cable lines to deliver Internet access. provides an international telephone standard for digital communication. has up to twenty-four 64-Kbps channels. operates over existing telephone lines to carry voice, data, and video. enables wireless Internet access.

operates over existing telephone lines to carry voice, data, and video.

Which of the following is a type of malware that takes control of a user's computer, blocking access to files, and demands payment in return for giving back access? Virus Trojan horse Evil twin Spyware Ransomware

ransomware

Rows in a table are commonly referred to as which of the following? Attributes Fields Entities Relations Records

records

Pharming involves: setting up a fake website to ask users for confidential information. using emails for threats or harassment. setting up fake Wi-Fi access points that look as if they are legitimate public networks. pretending to be a legitimate business's representative in order to garner information about a security system. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

A statement ranking information risks and identifying security goals would be included in which of the following? AUP Security policy Business impact analysis Risk assessment Business continuity plan

security policy

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website that asks for personal information. This is an example of which of the following? Pharming Cybervandalism DDOS attack Spear phishing Sniffing attack

spear phishing

Which of the following software tools would you use to prepare a what-if analysis? Presentation graphics Word processing Personal information management Desktop publishing Spreadsheet

spreadsheet

Which of the following would be the best tool for searching and analyzing unstructured data sets, such as emails and memos? Data warehouse RDBMS Web mining OLAP Text mining

text mining

Which of the following statements about blockchain is not true? The records in a blockchain are secured through cryptography. Once recorded, a blockchain transaction cannot be changed. Each block in a blockchain is connected to all the blocks before and after it. The data represented in a blockchain is maintained in a central database. Blockchain is vulnerable in some of the same ways as conventional, centralized recordkeeping systems.

the data represented in a blockchain is maintained in a central database.

A data governance policy specifies all of the following except: who is responsible for updating and maintaining information. the structure of the company's database. where information can be distributed. how data resources should be secured. which users and organizational units can share information.

the structure of the companies database

A computer network requires at least two computers. true or false

true

A hub is a networking device that sends packets of data to all other devices on the network. true or false

true

All 50 states have enacted legislation requiring private or governmental entities to notify individuals of security breaches involving their personally identifiable information. true or false

true

An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment. true or false

true

Client/server computing has largely replaced centralized mainframe computing. true or false

true

Client/server computing is the most widely used form of centralized processing. true or false

true

Computer networks that use packet switching are more efficient than telephone networks that use circuit switching. true or false

true

Dropbox is an example of a public cloud service. true or false

true

Gartner Inc. reported that more than 25 percent of the critical data in large Fortune 1000 companies' databases is inaccurate or incomplete. true or false

true

Most data quality problems stem from errors during data input. true or false

true

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. true or false

true

Web3 is envisioned as being even more decentralized than the current Internet and would be controlled by its users rather than dominated by big corporations. true or false

true

Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. true or false

true

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): IP address. third-level domain. child domain. uniform resource locator. root domain.

uniform resource locator

A ________ is software for locating and managing stored web pages. web server net server router hub modem

web server

Which of the following statements is not true about search engines? They can be gamed by scammers. They aim to enable users to instantly find information on the web. They have become major advertising platforms. Mobile search on mobile devices now makes up the majority of all searches. There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks. True or False

True

What would be a reason for using a workstation rather than a personal computer? When you need to share resources When you need to access a network When you need more powerful computational abilities When you need to serve applications and data to client computers When you need to connect to a cloud computing platform

When you need more powerful computational abilities

Which one of the following statements is not true? ICANN manages the domain name system. W3C sets programming standards for the Internet. The Internet backbone is owned by the federal government in the United States. The IAB helps define the overall structure of the Internet. The Internet must conform to laws where it operates.

The Internet backbone is owned by the federal government in the United States.

Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? Incorrect answer: Java C++ COBOL XML Visual Basic

Visual Basic

ZipRealty, which combines Google Maps with real estate data, is an example of: a mashup. a widget. cloud computing. SOA. a web service.

a mashup

Implementation controls: can be classified as input controls, processing controls, and output controls. govern the design, security, and use of computer programs and the security of data files in general throughout the organization. audit the systems development process at various points to ensure that the process is properly controlled and managed. apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment. include software controls, computer operations controls, and administrative controls.

audit the systems development process at various points to ensure that the process is properly controlled and managed.


Ensembles d'études connexes

Futuro Perfecto, El Tiempo Futuro, verbos regulares e irregulares, Participios irregulares

View Set

TRUE OR FALSE exam study guide for SPEECH

View Set

AP Environmental Science Vocabulary List

View Set

Chapter 27: Common Reproductive Conditions

View Set

Lesson 3: Work Relationships + Patient Interactions

View Set