mis 301 midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

adware

... causes pop-up advertisements to appear on your screen

high bandwidth

... is NOT an advantage of twister-pair wire

vpn

... is a private network that uses a public network to connect users

BPR

... is the most difficult, radical, lengthy, and comprehensive strategy

sql

... is the most popular query language used for interacting with a database

accuracy

... issues involve the authenticity, fidelity, and correctness of information that is collected and processed

responsibility

... means that you accept the consequences of your decisions and actions

software defined

... networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks

virtual

... organizations are only online

brick and mortar

... organizations are purely physical

accountability

... refers to determining who is responsible for actions that were taken

bluetooth

.... a short-range wireless network

coaxial

.... cables are made of copper

fiber optic

.... cables are made of glass

3g

.... cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging

spyware

.... collects personal information about users without their consent

http

.... defines how messages are formulated and how their receivers interpret them

microwave

.... is a broadcast medium

twisted pair

.... is a cable medium

firewall

.... is a communications control

difficult to work with

.... is a disadvantage of fiber optic cable

dos

.... is a remote attack requiring no user action

high bandwidth

.... is an advantage of coaxial cable

trojan horse

.... is an attack by a programmer developing a system

tcp/ip

.... is the protocol of the internet

privacy

.... issues involve collecting, storing, and disseminating information about individuals

clicks and mortar

.... organizations have physical and online dimensions

meo

.... satellites are used to run the gps system

satellite

.... transmission systems can have a large coverage area but their signals experience propagation delay

radio

.... transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted

ipv6

.... was developed because we have run out of ip addresses in the original ip addressing scheme

virus

..... is a remote attack requiring user action

spamware

..... is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services

microwave

..... transmission systems transmit data through electromagnetic waves

can when it is used effectively

IT ... be used to create a competitive advantage ...

hot

a ... site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations

byte bits

a .... is a a group of eight .....

mart warehouse

a data ... is a low-cost, scaled down version of a data .... that is designed for the end-user needs in an SBU or an individual department

warehouse

a data ... is a repository of historical data that are organized by subject to support decision makers in the organization

true

a foreign key is a primary key in another file.. true or false

lan

a network that is restricted to a single building is a .....

twisted pair

according to the textbook, ... is the most widely available cable medium

storefront

an electronic ... is website that represents a single store

input

an order from a customer is an .... for a business process

internet

an/the .... is a network of networks

competitive advantage

any assets that provide an organization with an edge against its competitors in some measure, such as cost, quality, speed

bits

bandwidth is stated in .... per second

human error unintentional

carless internet surging is ... and is an .... mistake

student table id

consider the following tables, .... is a primary key

monitoring process performance

dashboards are used in which of the following processes

redundancy

database systems minimize ....

attribute

each characteristic or quality of a particular entity is called an .....

rows columns

each relational database table contains records (listed in ....) and attributes (listed in.....)

dos

hackers would use a botnet to perform a ......

reverse lower

in .. auctions, one buyer wants to purchase a product or a service; these auctions result in ... prices over time

forward higher

in .... auctions, sellers solicit bids from many potential buyers; these auctions result in prices over time

viral marketing

in ...., recipients of your marketing notices send information about your product to their friends

affiliate marketing

in ....., vendors ask partners to place logo on the partner's website and then pay that partner a comission

public private

in public key encryption, the .... key is used for locking and the ... key is used for unlocking

knowledge

intellectual capital is another term for .....

BPI

is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process

spyware

keystroke loggers and screen scrapers are examples of .....

4g

lte is .... cellular technology

geo

only a few ... satellites are needed for global coverage

false of qr codes

qr codes are larger than bar codes because they store information both horizontally and vertically

not a basic function of tcp/ip

responsible for disassembling, delivering, and reassembling data during transmission

leo

satellite telephone services are provided through ... satellites

false

selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True or False?

foreign

the ... creates links between two tables

transport

the ... layer of tcp/ip provides communication and packet services

opt out

the ... model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected

rights

the .... approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties

fairness

the .... approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard

utilitarian

the .... approach states that an ethical action is the one that provides the most good or does the least harm

primary

the .... key is an identifier field that uniquely identifies a record

internet

the .... layer of tcp/ip is responsible for addressing, routing, and packaging data packets

opt in

the .... model informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it

common good

the ..... approach highlights the interlocking relationships that underlie all societies

components services personnel

the IT infrastructure is

wan

the internet is a .....

two

the relational database model is based on the concept of ..... dimensional tables

viscous

which of the following is NOT a characteristic of big data

how should we handle illegally copying copyrighted software?

which of the following is a property issue?

bit byte field record file database

which of the following is an accurate representation of the data hierarchy from smallest to largest?

wan man lan pan

which of the following is the correct order of networks from largest to smallest?

create capture refine store manage disseminate

which of the following is the correct order of the KMS cycle?

product customization

with ....., customers use the internet to self-configure products or services

mobile

you use your smartphone to look up how much money you have in your bank account. this is an example of .... commerce


Ensembles d'études connexes

Triangle shirtwaist factory fire

View Set

Chapter 69: Management of Patients with Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set

DEMONSTRATING CONSERVATION OF MASS WITH BALANCED EQUATIONS

View Set

ATI: Knowledge and Clinical judgement beginner

View Set

CHAPTER 13: Brain and Cranial Nerves

View Set