MIS Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.

Key field

A network that spans a city, and sometimes its major suburbs, as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.

MAN

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement

Managing the supply chain

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A) multicore processor B) legacy processor C) scalable processor D) aggregate circuit E) green circuit

Multicore processor

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.

Network service providers

Which of the following tools enables users to view the same data in different ways using multiple dimensions? A) Predictive analysis B) SQL C) OLAP D) Data mining E) Hadoop

OLAP

Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.

Operating system software

The HIPAA Act of 1996: A) requires financial institutions to ensure the security of customer data. B) specifies best practices in information systems security and control. C) imposes responsibility on companies and management to safeguard the accuracy of financial information. D) outlines medical security and privacy rules. E) identifies computer abuse as a crime and defines abusive activities.

Outlines medical security and privacy rules.

The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.

Outsourcing

A DBMS makes the: A) physical database available for different logical views. B) relational database available for different logical views. C) physical database available for different analytic views. D) relational database available for different analytic views. E) logical database available for different analytic views.

Physical database available for different logical views.

A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity.

Primary key

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A) co-location. B) edge computing. C) grid computing. D) utility computing. E) quantum computing.

Quantum computing

Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy

Redundancy

A(n) ________ represent data as two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS

Relational DBMS

A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A) modem B) router C) packet D) telnet E) hub

Router

In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.

Row

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.

SLA

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A) Security B) Controls C) Benchmarking D) Algorithms E) Identity management

Security

In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select.

Select, project, and join

Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content

Semantic search

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A) hacking. B) malware. C) denial-of-service attacks. D) sniffing. E) vandalism.

Sniffing

Tricking employees into revealing their passwords by pretending to be a legitimate member of a company is called: A) sniffing. B) social engineering. C) phishing. D) pharming. E) snooping

Social engineering

A SAN is a ________ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement

Storage area

On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS

TCP/IP

Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT B) The entity CUSTOMER with the attribute PURCHASE C) The entity PRODUCT with the attribute PURCHASE D) The entity PRODUCT with the attribute CUSTOMER E) The entity PURCHASE with the attribute CUSTOMER

The entity CUSTOMER with the attribute PURCHASE

All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets. D) the inability to fully test programs. E) the increase in malicious intruders seeking system access.

The increasing in malicious intruders seeking system access

Which of the following is an example of a legacy system? A) Transaction processing system running on a mainframe B) Scalable grid computing system C) Web services running on a cloud computing platform D) MDM software E) Quantum computing system

Transaction processing system running on a mainframe

A physical view shows data as it is actually organized and structured on the data storage media. True or False

True

An application server may reside on the same computer as a web server or on its own dedicated computer. True or False

True

Authentication refers to verifying that a person is who he or she claims to be. True or False

True

Cloud computing is the fastest growing form of computing. True or False

True

Computer networks are fundamentally different from telephone networks. True or False

True

Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business. True or False

True

Every record in a file should contain at least one key field. True or False

True

Hypertext markup language specifies how text, graphics, video, and sound are placed on a webpage. True or False

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks. True or False

True

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses. True or False

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. True or False

True

NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations. True or False

True

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. True or False

True

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. True or False

True

The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet. True or False

True

The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision. True or False

True

The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals. True or False

True

The operating system is used to manage the computer's activities. True or False

True

The term data governance refers to the policies and processes for managing the integrity and security of data in a firm. True or False

True

Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace. True or False

True

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. True or False

True

Viruses can be spread through e-mail. True or False

True

Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks. True or False

True

Wikis allow visitors to change or add to the original posted material. True or False

True

You can use OLAP to perform multidimensional data analysis. True or False

True

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called: A) smart card authentication. B) biometric authentication. C) two-factor authentication. D) symmetric key authorization. E) token authentication.

Two-factor authentication.

All of the following are current hardware platform trends except: A) green computing. B) virtualization. C) cloud computing. D) Unix. E) quantum computing.

Unix

OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports.

Users to obtain online answers to ad-hoc questions in a rapid amount of time.

A digital certificate system: A) uses third-party CAs to validate a user's identity. B) uses digital signatures to validate a user's identity. C) uses tokens to validate a user's identity. D) is used primarily by individuals for personal correspondence. E) protects a user's identity by substituting a certificate in place of identifiable traits.

Uses third-party CAs to validate a user's identity.

All of the following are cloud computing services except: A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service.

Virtualization as a service.

Which of the following statements about Internet security is not true? A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.

VoIP is more secure than the switched voice network.

A(n) ________ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub

Web server

Which of the following would you use to find patterns in user interaction data recorded by a web server? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining

Web usage mining

A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network.

Wide area network

________ provides a standard format for data exchange, enabling web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML

XML

SaaS refers to: A) supplying online access over networks to storage devices and storage area network technology. B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis. D) none of the above.

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) Address B) City C) Airport code D) State E) Day

Airport code

Firms that allow employees to use their own devices are embracing which of the following? A) Wearable computing B) Mobile consolidation C) Cloud computing D) BYOD E) Self computing

BYOD

All of the following are currently being used as traits that can be profiled by biometric authentication except: A) fingerprints. B) facial characteristics. C) body odor. D) retinal images. E) voice.

Body odor

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A) service. B) client. C) browser. D) app. E) beacon.

Browser

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless E) network

Chat

Computer forensics tasks include all of the following except: A) presenting collected evidence in a court of law. B) securely storing recovered electronic data. C) collecting physical evidence on the computer. D) finding significant information in a large volume of electronic data. E) recovering data from computers while preserving evidential integrity

Collecting physical evidence on the computer.

The join operation: A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments. E) creates a subset consisting of rows in a table.

Combines relational tables to provide the user with more information than is otherwise available.

Pv6 has been developed in order to: A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2. E) reduce excess IP addresses. business?

Create more IP addresses

The select operation: A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria. E) creates a subset consisting of rows in a table.

Creates a subset consisting of all records in the file that meet stated criteria.

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS

DNS

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication

Data inconsistency

The term big data refers to all of the following except: A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes). E) data from Web traffic.

Datasets with fewer than a billion records.

Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network.

Difference between the highest and lowest frequencies that can be accommodated on a single channel.

In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission B) Establishing an Internet connection between two computers C) Moving packets over the network D) Sequencing the transfer of packets E) Breaking messages down into packets

Disassembling and reassembling packets during transmission

Which of the following focuses primarily on the technical issues of keeping systems up and running? A) Business continuity planning B) Security policies C) Disaster recovery planning D) An AUP E) An information systems audit

Disaster recovery plan

A firewall allows the organization to: A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing e-mail messages. E) create access rules for a network.

Enforce a security policy on data exchanged between its network and the Internet.

Data cleansing not only corrects errors but also: A) establishes logical relationships between data. B) structures data. C) normalizes data. D) removes duplicate data. E) enforces consistency among different sets of data.

Enforces consistency among different sets of data

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A) TCP/IP B) COBOL C) Ethernet D) ASCII E) Linux

Enthernet

A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.

Entity-relationship diagram.

A computer network consists of at least three computers. True or False

False

A computer virus replicates more quickly than a computer worm. True or False

False

A hub is a networking device that is used to filter and forward data to specified destinations on the network. True or False

False

An acceptable use policy defines the acceptable level of access to information assets for different users. True or False

False

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching. True or False

False

Data scrubbing is a more intensive corrective process than data cleansing. True or False

False

DoS attacks are used to destroy information and access restricted areas of a company's information system. True or False

False

Exponential growth in the number of transistors and the power of processors is expected to increase for the foreseeable future. True or False

False

In a client/server environment, a DBMS is located on a dedicated computer called a web server. True or False

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses. True or False

False

Data mining allows users to: A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. E) access the vast amounts of data in a data warehouse.

Find hidden relationships in data

Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A) OLAP B) Data warehouse C) Data mart D) Hadoop E) DBMS

Hadoop

A data warehouse is composed of: A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data. E) historic external data.

Historic and current internal data.

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP

ISP

All of the following are issues with the traditional file environment except: A) data inconsistency. B) inability to develop specialized applications for functional areas. C) lack of flexibility in creating ad-hoc reports. D) poor security. E) data sharing.

Inability to develop specialized applications for functional areas.

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.

Information policy

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations.

Is an encrypted private network configured within a public network.

A Trojan horse: A) is software that appears to be benign but does something other than expected. B) is a virus that replicates quickly. C) is malware named for a breed of fast-moving Near-Eastern horses. D) installs spyware on users' computers. E) is a type of sniffer used to infiltrate corporate networks.

Is software that appears to be benign but does something other than expected.


Ensembles d'études connexes

gravity, eclipses and tides review

View Set

NURS 321 Practice Questions for Hepatobiliary

View Set