ISMN Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

primary key

A field that uniquely identifies a given entity in a table

dial up (connection)

Still used in the United States where broadband is not available

WAN

a network that covers a large geographical area.

Master data

a set of core data, such as customer, product, location, and that span the enterprise's information systems.

computer network

a system that connects computers and other devices through communications media so that data and information can be transmitted among them.

6. ________ refers to efforts by unauthorized users to access data that are traveling over wireless networks. a) A rogue access point b) An evil twin attack c) Eavesdropping d) War driving

a) A rogue access point

9. SMTP is part of the ________ layer of TCP/IP. a) application b) Internet c) network interface d) transport

a)application

Data Governance

approach to managing information across an entire organization

1. Suppose you use your university's computer lab to print your research papers. If this computer lab contains desktop computers that use a Wi-Fi hotspot to connect to the printer in the center of the room, it is a ________ lab. a) mobile b) wireless c) mobile and wireless d) a waste of resources

c) mobile and wireless

4. ________ satellites are used to run the GPS system. a) GEO b) LEO c) MEO d) VEO

c)MEO

7. Bluetooth is a ____. a) LAN b) MAN c) PAN d) WAN

c)PAN

2. Which of the following is the correct order of networks from largest to smallest? a) MAN, WAN, LAN, PAN b) MAN, WAN, PAN, LAN c) WAN, MAN, LAN, PAN d) WAN, MAN, PAN, LAN

c)WAN,MAN,LAN,PAN

LAN

connects two or more devices in a limited geographical region

what is latency?

delay in transmission

hyperlink

is a connection from a hypertext file or document to another location

intranet

network that uses Internet protocols so that users can take advantage of familiar applications and work habits.

PAN

short-range networks—typically a few meters—that are used for communication among devices close to one person.

medium range networks and examples

simplify the task of connecting one device to another. (Wi-Fi networks)

short range networks and examples

simplify the task of connecting one device to another. (bluetooth, UWB, NFC)

long range networks and examples

simplify the task of connecting one device to another. (cellular telephones and wireless broadband)

Distributed Processing - peer to peer

type of client/server distributed processing in which each computer acts as both a client and a server.

WAP - wireless access point

typical configuration, a transmitter with an antenna

Which Orbits are for various use

(tv, GPS, Telephone)

how much big data

44

cable modem (connection)

Access over your cable TV coaxial cable.

satellite (connection)

Access where cable and DSL are not available

dsl (connection)

Broadband access through telephone companies

Byte: Bit:

Byte 8 Bit 0 or 1

Issues w/Big Data (3)

Can Come from Untrusted Sources, changes especially in data streams, and is dirty

How Database Minimizes Problems

Data security. Data safety. ... Resource utilization. ... High availability.

ER Diagram

Document that shows data entities and attributes and relationships among them.

fiber to the hom

Expensive and usually placed only in new housing developments

Domain Name System (DNS)

Internet phone book that turns everything into an IP address

3. You have satellite TV. Providers use ________ satellites to get this service to you. a) GEO b) LEO c) MEO d) VEO

a)GEO

adv and dis for Radio

adv: dis:

adv and dis for satellite

adv: High bandwidth, Large coverage area dis: expensive, Must have unobstructed line of sight, Signals experience propagation delay, Must use encryption for security

adv and dis for microwaves

adv: High bandwidth, Must have unobstructed line of sight dis: Must have unobstructed line of sight Susceptible to environmental interference

Coaxial cable

advantages: Higher bandwidth than twisted-pair, Less susceptible to electromagnetic interference disadvantages: expensive, low security

6. Database systems maximize ________. a) inconsistency b) independence c) isolation d) redundancy

b) independence

11. ________ was developed because we have run out of IP addresses in the original IP addressing scheme. a) IPv2 b) IPv4 c) IPv6 d) IPv8

c) IPv6

2. ________ transmission systems can have a large coverage area but are expensive. a) Fiber b) Microwave c) Radio d) Satellite

d) Satellite

4. ________ are generated and captured by operational systems and describe the business's activities. a) Data governance b) Master data c) Master data management d) Transaction data

d) Transaction data

9. Your actual download speed is determined by ________. a) broadband b) downloadability c) connection speed d) throughput

d) throughput

3. _________s cover a city. a) LAN b) MAN c) PAN d) WAN

d)WAN

Connection Methods

dial-up, dsl, cable modem, satellite, wireless, fiber to the hom

5g scenarios

fixed wireless broadband, enhanced mobile broadband, massive machine-type communications, and ultra-reliable low latency communications

Foreign Key

from one table that is used in another table.

5G disadvantages

limited global coverage available only in specific locations It can't go through barriers like walls

Distributed Processing - Client/Server

links two or more computers in an arrangement in which some machines, called servers, provide computing services for user PCs, called clients.

Portal (example)

offers information and advice on how to avoid falling victim to ransomware (locos, Microsoft network, information week, zdnet)

internet of things

refers to the billions of animate (living) and inanimate objects that are equipped with embedded sensors and connected wirelessly to the Internet.

KMS

refers to the use of technologies to enhance knowledge management both within one firm and among multiple firms

MAN

relatively large networks that cover a metropolitan area

Clickstream data

tracks the exact pattern of a consumer's navigation through a website

3 Vs of Big Data

volume, velocity, variety

Dematerialization

when the functions of many physical devices are included in one other physical device.

Transactional data

which are generated and captured by operational systems, describe the business's activities, or transactions

wireless transmission media

• Microwave • Satellite • Radio

1. ________ are those data that visitors and customers produce when they visit a website and click on hyperlinks. a)Clickstream data b)Cookies c)ERP d)RFID

a) clickstream data

5. Database systems minimize ________. a) inconsistency b) independence c) integrity d) security

a) inconsistency and redundancy

10. ________ is an example of the first type of peer-to-peer processing that accesses unused CPU power among networked computers. a) BitTorrent b) Grid computing c) Microsoft SharePoint Workspace d) Napster

b)grid computing

Data Hierarchy

bit - byte - field - record - table - database

Accurate representation of the data hierarchy from smallest to largest?

bit, byte, field, record, file, database

The internet is ______. a) LAN b) MAN c) PAN d) WAN

d) WAN

secondary key

A field that has some identifying information, but typically does not uniquely identify a record with complete accuracy.

Data Warehouse

A logical collection of information that supports business analysis activities

WLAN

Medium-range wireless networks

Packet Switching

The transmission technology that breaks up blocks of text into packets

Wireless Devices 3 Major advantages

They are small enough to easily carry or wear. They have sufficient computing power to perform productive tasks. They can communicate wirelessly with the Internet and other devices.

14. Which of the following is TRUE of enterprise data warehouses? They are flexible. They cannot meet all business needs. They specialize in handling sensor data. They manage a broad variety of data.

Theyareflexible

wireless (connection)

Very convenient, and WiMAX will increase the use of broadband wireless

internet

a global computer network providing a variety of information and communication facilities

QBE

a method of creating database queries that allows the user to search for documents

11. Donald and his tech team are working on creating a new smartphone. They want companies to know be able to use location data to market to customers. Which feature of mobility are they concerned with? a) localization b) connectivity c) ubiquity d) customization

a) localization

14. ______________ is usually carried out secretly by governments who want to control citizens' access to the internet. a) Bandwidth throttling b) Blocking content c) Charging higher access fees d) Completely blocking access

a)Bandwidth throttling

10. Your name in your university's database is a(n) ________. a) attribute b) database c) entity d) instance

a)attribute

5. ________ modem services share bandwidth among subscribers in a locality, so speeds can decrease significantly when large numbers of neighbors access the Internet at the same time. a) Cable b) Dial-up c) DSL d) Fiber

a)cable

twisted-pair wire

advantages: Inexpensive, Widely available disadvantages: Slow, low security

Fiber-optic cable

advantages: Very high bandwidth, Relatively inexpensive, good security disadvantages: Difficult

crowd sourcing

an organization outsources a task to an undefined, generally large group of people in the form of an open call.

What 4 industries will 5G have the most impact?

automotive and transportation, healthcare and manufacturing

5. GPS uses the known speed of the signals and distance from ________ satellite(s) to find the location of a receiving station or user. a) 1 b) 3 c) 5 d) 7

b) 3

3. ________ is an approach to managing information across an entire organization. a) Big data b) Data governance c) Master data d) Master data management

b) Data governance

8. The relational database model is based on the concept of ________-dimensional tables. a) one b) two c) three d) four

b) two

4.________ modems convert information for use on the POTS and are almost extinct in most parts of the developed world today. a) Cable b) Dial-up c) DSL d) Fiber

b)Dial-up

13. Data marts and data warehouses typically use ________. a) ERP b) OLAP c) OLTP d) RFID

b)OLAP

1. Bandwidth is stated in ________ per second. a) beeps b) bits c) blips d) bytes

b)bits

6. ________ cables are made of glass. a) Coaxial b) Fiber-optic c) Microwave d) Twisted-pair

b)firber-optic

TCP.IP

have enormous impacts on our lives, both professionally and personally

cellular technology

having many small interconnected transmitters as opposed to one big one.

5G - low or high? Why?

high and additional speed

Bluetooth

industry specification used to create small personal area networks

Data Mart

low-cost, scaled-down version of a data warehouse

Unstructured Data

Not defined and does not follow a specified format

8. Which of the following is NOT a basic function of TCP/IP? a) Acknowledges the packets have been transmitted b) Manages the movement of data packets between computers by establishing a connection between the computers c) Responsible for disassembling, delivering, and reassembling data during transmission d) Sequences the transfer of packets

c) Responsible for disassembling, delivering, and reassembling data during transmission

12. The ________ is a system of universally accepted standards for storing, retrieving, formatting, and displaying information through a ________ architecture. a) Internet; client/server b) Internet; peer-to-peer c) WWW; client/server d) WWW; peer-to-peer

c) WWW; client/server

12. Paul is travelling to a new client and he receives messages about traffic along the way. Paul is using _______. a) a mobile wallet b) location services c) intrabusiness applications d) a mobile portal

c) intrabusiness applications

7. ________ is an advantage of coaxial cable. a) Cost b) Easy to work with c) High bandwidth d) Security

c)high bandwidth

9. A(n) ________ of an entity refers to each row in a relational table, which is a specific, unique representation of the entity. a) attribute b) field c) instance d) record

c)instance

Big Data

collection of data that is so large and complex that it is difficult to manage using traditional database management systems

KMS Cycle

create knowledge (create new ways) capture knowledge (new must be valuable) refine knowledge (placed in context) store knowledge (reasonable format) manage knowledge (kept current) disseminate knowledge (made available)

2. Which of the following is NOT a reason managing data is difficult? a) Data are generated from multiple sources. b) Data are scattered throughout organizations. c) Data are subject to data rot. d) The amount of data is decreasing exponentially with time.

d) The amount of data is decreasing exponentially with time.

8. ________ is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. It is a ______-range wireless network technology. a) NFC; medium b) NFC; short c) UWB; medium d) UWB; short

d) UWB; short

10. ________ means a mobile device can provide information and communication regardless of the user's location. a) Broad reach b) Localization c) Mobility d) Ubiquity

d) Ubiquity

13.________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. a) Collaboration b) A virtual team c) A workgroup d) Workflow

d) Workflow

7. A ________ is a group of ________. a) bit; 4 bytes b) bit; 8 bytes c) byte; 4 bits d) byte; 8 bits

d) byte; 8 bits

12. A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization. a) mart b) shop c) store d) warehouse

d)warehouse

Structured Data

data in the form of rows and columns and numerical

Relational Databases

databases that carry their data in the form of tables and that represent relationships using foreign keys

SQL

most popular query language used for interacting with a database

ETL Process

need to extract the data, transform them, and then load them into a data mart or warehouse.

11. Considering the following tables, ________ is a primary key. a) Order Table: PID b) Restaurant Table: Location c) Pizza Table: Name d) Pizza Table: PID

restaurant table; location

Radio Frequency Identification (RFID)

technology allows manufacturers to attach tags containing antennae and computer chips on products.


Ensembles d'études connexes

BioAP Chapter 32 (Packet) Homeostasis and Endocrine Signaling

View Set

Wordly Wise 3000 Book 8 Lesson 8

View Set

MCAT General Chemistry Chapter 5- Chemical Kinetics

View Set

Ch 13, Ch 8, Ch 9, Ch 10, Ch 11, Chapter 12

View Set

Peds: Chapter 8 Child Abuse and Neglect

View Set