MIS 301 Exam 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

LTE is ________ cellular technology

4G

______ is an attack by a programmer developing a system

A trojan horse

______ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process

BPI

______ is the most difficult, radical, lengthy and comprehensive strategy

BPR

What is an example of a SCADA attack?

Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant

Hackets would use a botnet to perform a ________

DoS

______ is a remote attack requiring no user action

DoS

A network that is restricted to a single building is a ________

LAN

The ______ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected

Opt-Out

The IT infrastructure is

The IT components, IT services, IT personnel

The internet is a ________

WAN

_______ refers to determining who is responsible for actions that were taken

accountability

The _________ approach states that an ethical action is the one that provides the most good or does the least harm

utilitarian

in ________, recipients of your marketing notices send information about your product to their friends

viral marketing

________ organizations are only online

virtual

which of the following is NOT a characteristic of Big Data? - velocity - viscous - volume - variety

viscous

An information system's _____ is the likelihood that the system or resource will be compromised by a ___ that will result in its ____ to further attacks

vulnerability; threat; exposure

A data __________ Is a repository of historical data that are organized by subject to support decision makers in the organization

warehouse

IT _____ be used to create a competitive advantage _____.

can; when it is used effectively

________ organizations have physical and online dimensions

clicks - and - mortar

________ cables are made of copper

coaxial

the ________ approach highlights the interlocking relationships that underlie all societies

common good

what is the correct order of the KMS cycle?

create, capture, refine, store, manage, disseminate

Which shape represents questions?

diamond

________ Is a disadvantage of fiber-optic cable

difficult to work with

______ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others

information privacy

the _______ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it

opt - in

the _______ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected

opt - out

the __________ key is an identifier field that uniquely identifies a record

primary

________ issues involve collecting, storing and disseminating information about individuals

privacy

the ________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties

rights

each relational database table contains records (listed in __________) and attributes (listed in __________)

rows; columns

________ transmission systems can have a large coverage area but their signals experience propagation delay

satellite

________ Networks are an emerging technology that is becoming increasingly important to help organizations manage their data flow across their enterprise networks

Software-defined

careless internet surfing is ______ and is an ______ mistake

a human error; unintentional

_________ causes pop-up advertisements to appear on your screen

adware

the __________ creates links between two tables

foreign key

Whereas phishing attacks are _____, denial of services attacks are _____

remote attacks requiring use action; remote attacks requiring no user action

_________ means that you accept the consequences of your decisions and actions

responsibility

________ is pestware that uses your computer as a launch pad for unsolicited email, usually advertising for products and services

spamware

which of the following is not "unstructured data"

spreadsheet

_________ collects personal information about users without their consent

spyware

keystroke loggers and screen scrapers are examples of _______

spyware

an electronic ________ is a website that represents a single store

storefront

considering the following tables, __________ is a primary key

student table: ID

_______ is a remote attack requiring user action

virus

how many branches should be followed by a question?

2

________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging

3G

Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True or false

False

only a few ________ satellites are needed for global coverage

GEO

________ defines how messages are formulated and how their receivers interpret them

HTTP

What is an example of a property issue?

How should we handle illegally copying copyrighted software?

________ developed because we have run out of IP addresses in the original IP addressing scheme

IPv6

satellite telephone services are provided through ________ satellites

LEO

________ satellites are used to run the GPS system

MEO

Dashboards are used in which of the following processes?

Monitoring process performance

False about QR codes

QR codes are larger than barcodes because they store information both horizontally and vertically

__________ is the most popular query language used for interacting with a database

SQL

which of the following is the most prominent data manipulation language today?

SQL

________ is the protocol of the internet

TCP/IP

The ________ layer of TCP/IP provides communication and packet services

Transport

T/F A foreign key is a primary key in another file

True

blacklisting is when everything can run except what is on the list. T or F lol creagan

True

__________ is a private network that uses a public network to connect users

VPN

What is the correct order of networks from largest to smallest?

WAN,MAN,LAN,PAN

_______ issues involve the authenticity, fidelity, and correctness of information that is collected and processed

accuracy

in ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission

affiliate marketing

each characteristic or quality of a particular entity is called an __________

attribute

data hierarchy listed from smallest to largest

bit, byte, field, record, file, database

Bandwidth is stated in _____ per second

bits

Which of the following is NOT an example of alien software? - adware -blockware -spyware -spamware

blockware

________ is a short range wireless network

bluetooth

________ organizations are purely physical

brick-and-mortar

a __________ is a group of eight __________

byte; bits

the ______ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard

fairness

________ cables are made of glass

fiber-optic

_______ is a communications control

firewall

in ________ auctions, sellers solicit bids from many potential buyers; these auctions results in ________ prices over time.

forward; higher

________ is NOT an advantage of twisted-pair wire

high bandwidth

________ is an advantage of a coaxial cable

high bandwidth

A __________ site is a fully configured computer facility with all the company's services, communication links and physical plant operations

hot

Which of the following is not in the business analytics domain?

in-memory computing diamon

An order from a customer is a(n) _____ for a business process

input

the ________ is a network of networks

internet

the ________ layer of TCP/IP is responsible for addressing, routing and packaging data packets

internet

intellectual capital is another term for __________

knowledge

_______ is an example of a pre-digital data storage tat is comparable to a database

library card catalog

A data __________ is a low-cost, scaled-down version of a data __________ that is designed for the end-user needs in an SBU or an individual department

mart; warehouse

________ is a broadcast medium

microwave

________ transmission systems transmit data through electromagnetic waves

microwave

you use your smartphone to look up how much money you have in your bank account. This is an example of ____________ commerce

mobile

with ________, customers use the internet to self-configure products or services

product customization

In public - key encryption, the _______ key is used for locking and the __________ key is used for unlocking

public; private

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted

radio

Which shape represents actions?

rectangle

database systems minimize __________

redundancy

What is NOT a basic function of TCP/IP?

responsible for disassembling, delivering and reassembling data during transmission

in ________ auctions, one buyer wants to purchase a product; these auctions result in ________ prices over time

reverse; lower

according to the textbook, ________ is the most widely available cable medium

twisted pair

________ is a cable medium

twisted-pair

the relational database model is based on the concept of __________- dimensional tables

two

The ______ approach states that an ethical action is the one that provides the most good or does the least harm

utilitarian


Ensembles d'études connexes

Financial Markets and Institutions- Exam 2

View Set

Chapter 37: Assessment and Management of Patients With Allergic Disorders- MS2

View Set

CS-4451 Quiz 07 - Public key Infrastructure and Cryptographic Protocols Study Questions

View Set

M328 Issues in Intercollegiate Athletics Exam 2

View Set