MIS Test 2 (CH6-9)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

3. According to Panorama Consulting​ Solutions, the average cost of an ERP project is approximately​ ________.

2.8 million dollars

A(n) ________ signal is a​ discrete, binary waveform. A. digital B. tenuous C. business process D. analog E. ERD

A

An emerging​ non-relational database management system is called​ ________. A. NoSQL B. XBRL C. Oracle D. an​ information-base E. a relational database

A

Another term for a key field is a​ ________. A. primary key B. foreign key C. data key D. surrogate key E. null key

A

IS security firewalls are an example of a​ ________. A. gatekeeper B. backup plan C. network topology D. human safeguard E. virus

A

If someone loads a program that tracks everything you​ type, the specific spyware is a​ ________. A. key logger B. ​denial-of-service attack C. SQL injection attack D. data mining error E. digital footprint

A

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized​ information, they are​ ________. A. phishing B. fishing C. trolling D. perching E. smacking

A

In​ 2002, the​ ________ Act was passed to help protect investors with new financial statements reforms. A. Sarbanes-Oxley B. HIPO C. ERD D. HIPAA E. FERPA

A

MasterCard having a duplicate computer center in multiple cities is an example of​ ________ in case operations at one location are disrupted. A. disaster recovery planning B. processing C. business intelligence D. output E. data mining

A

Microsoft's DBMS that includes​ built-in report generation and reporting is called​ ________. A. Access B. SQL Server C. MySQL D. Spreadsheets E. DB2

A

Microsoft's most powerful DBMS is​ ________. A. SQL Server B. MySQL C. DB2 D. Oracle E. Excel

A

Using your handprint to access a safe deposit box is an example of​ ________ authentication. A. biometric B. cloud computing C. password D. spreadsheet E. network

A

________ are data files used to identify and protect online transactions using a trusted third party. A. Digital certificates B. SSL C. Digital confirmations D. Analog confirmations E. Analog certificates

A

________ is a method for encrypting network traffic on the Web. A. SSL B. XML C. ITLS D. Http E. XBRL

A

________ is the most popular NoSQL DBMS. A. Hadoop B. MySQL C. SQL Server D. Paradox E. ID2

A

________ is used to ensure the person is who​ he/she claims to be. A. Authentication B. A production worker C. Knowledge management D. An encryption E. Data mining

A

802.11 is also known as​ ________. A. hardware B. ​Wi-Fi C. XML D. XBRL E. www

B

A router is a communications processer used to route​ ________ through different networks. A. databases B. packets of data C. data drivers D. data blasts E. data cycles

B

A(n) ________ is an important resource for an organization to​ create, illustrating rules on how data is organized and who has access to what data. A. database B. information policy C. database approach D. data model E. data requirements

B

A(n) ________ outlines acceptable uses of information systems assets. A. hardware policy B. acceptable use policy C. phishing plan D. ​entity-relationship diagram E. data policy

B

A(n) ________ uses the Internet to create a secure network connection. A. management systems private network​ (MSPN) B. virtual private network​ (VPN) C. information systems private network​ (ISPN) D. technology private network​ (TPN) E. systems private network​ (SPN)

B

Amazon is one of the first to provide cloud computing relational databases. This effort is called​ ________. A. CloudDB B. Amazon Relational Database Service C. ConnectDB D. Amazon Cloud E. Amazon DBMS

B

An Internet Protocol​ (IP) address​ ________. A. is a​ 16-bit number assigned only to servers on the Internet B. is a​ 32-bit number assigned to every computer on the Internet C. contains the mailing zip code of the network D. is a​ 32-bit number assigned only to servers on the Internet E. is a​ 16-bit number assigned to every computer on the Internet

B

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A. A. byte B. field C. bit D. file E. record

B

A​ ________ provides the link from one table to another​ table's primary key. A. surrogate key B. foreign key C. primary key D. data key E. referential key

B

The domain extension .mil represents​ ________. A. manufacturing sites B. the U.S. Military C. commercial sites D. educational institutions E. business firms

B

The field that uniquely identifies a row in a relational database table is called a​ ________. A. foreign key B. primary key C. column D. data definition language E. null value

B

The number of cycles per second that can be sent through a network medium is calculated in​ ________. A. data per second B. hertz C. seconds D. minutes E. bytes per second

B

The​ ________ is the​ world's most​ extensive, public communication system. A. Google search engine B. Internet C. Intranet D. LAN E. Datanet

B

The​ world's largest network is the​ ________. A. intranet B. Internet C. enterprise system D. digital firm E. ​brick-and-mortar

B

_________ is a widely used open source DBMS. A. Word Star B. MySQL C. SQL Server D. Excel E. DB2

B

1.________ in enterprise applications provides features for managers to obtain meaningful information from massive amounts of data.

Business intelligence

Although​ "Big Data"​ doesn't refer to a specific amount of​ data, it usually does involve​ ________. A. bits B. bytes C. petabytes D. gigabytes E. megabytes

C

An information systems​ ________ examines a​ firm's overall security environment and determines if the organization is properly prepared to address threats. A. intelligence B. accounting C. audit D. operations E. data mining

C

An intrusion detection system​ (IDS) ________. A. creates phishing problems B. is a hardware component related to computer monitors C. helps protect a system using​ full-time monitoring tools D. causes damage to a system E. is a social media application

C

Another name for a database field is​ a(n) ________. A. database B. tuple C. attribute D. row E. record

C

A​ ________ is a program that monitors information traveling over a network and​ ________. A. sniffer; is never legitimately used B. ​sniffer; is always legitimately used C. ​sniffer; can be used for criminal purposes D. dribble​ file; can be used for criminal purposes E. network; is always legitimately used

C

A​ ________ is the smallest component in the computer system data hierarchy. A. byte B. field C. bit D. record E. file

C

Coaxial cable is​ a(n) ________ for linking network components. A. processing device B. database system C. connection medium D. output device E. input device

C

The Domain Name System​ (DNS) converts​ ________ to​ ________. A. IP​ addresses; domain names B. ​data; zip codes C. domain​ names; IP addresses D. IP​ addresses; zip codes E. zip​ codes; IP addresses

C

The SQL​ ________ statement allows you to combine two different tables. A. SELECT B. GROUP BY C. JOIN D. COMBINE E. ORDER BY

C

________ are used to track movements of products through the supply chain. A. Digital footprints B. System trackers C. RFIDs D. Digital trackers E. Digital firms

C

________ includes computer​ viruses, worms, and Trojan horses. A. Wi-fi B. Security C. Malware D. Firewall E. Click fraud

C

A network that spans between Montana and Washington is​ a(n) ________. A. unorganized network B. binding network C. local area network D. wide area network E. nationwide network

D

A small business that connects personal devices within a​ 500-meter radius is​ a(n) ________. A. wide area network B. unorganized network C. worldwide network D. local area network E. binding network

D

According to​ McAfee, ________ now pose the greatest security risks. A. software as a service B. social media C. email D. mobile devices E. databases

D

A​ ________ is a component in the computer system data hierarchy consists of multiple records of the same type. A. bit B. field C. byte D. file E. record

D

A​ ________ is a component in the computer system data hierarchy that represents an ASCII character. A. bit B. field C. record D. byte E. file

D

A​ ________ is a software program that mimics another program and often causes damage. A. quarter horse B. wild horse C. database D. Trojan horse E. mustang

D

Bluetooth is another name for the​ ________ wireless networking standard. A. coaxial B. 802.11 C. database of D. 802.15 E. ​Wi-Fi

D

Digital information transfer speeds are measured in​ ________. A. bytes per second B. bytes per minute C. bits per minute D. bits per second E. data per second

D

If a computer is sending a​ file, and a packet being sent is​ damaged, the​ ________ computer asks the​ ________ computer to retransmit it. A. sending; receiving B. network​ cable; receiving C. receiving; end-user D. receiving; sending E. ​receiving; network cable

D

SQL injection attacks are related to​ ________. A. spreadsheets B. bit firms C. output devices D. databases E. word processing

D

Slicing digital messages into parcels is called​ ________. A. packet drops B. bit firms C. network binders D. packet switching E. digital footprints

D

TCP/IP was original developed in the 1970s to support​ ________. A. Web developers B. e-commerce organizations C. database managers D. the Department of Defense E. the U.S. Treasury

D

The most commonly used authentication technique used for end users is​ a(n) ________. A. hand scan B. voice recognition C. email address D. password E. chip

D

________ deal(s) with both behavioral and technical issues regarding information​ systems, and focuses on the​ development, use, and impact of systems by managers and employees. A. Management information systems​ (MIS) B. Information C. Data D. Information systems​ (IS) E. Information technology​ (IT)

D

________ was passed in 1996 to protect medical records. A. ERD B. FERPA C. HIPO D. HIPAA E. ​Sarbanes-Oxley

D

A(n) ________ is the most popular method to model a database. A. EM model B. normalization C. model relationship​ (MR) D. enterprise model E. ​entity-relationship (ER) model

E

Another term for a database row is​ a(n) ________. A. database B. spreadsheet C. field D. attribute E. record

E

A​ ________ links two or more computers which enable the sharing of information. A. hardware B. cloud computing C. spreadsheets D. social media E. network

E

Data​ cleansing, working to identify and fix incorrect​ data, is also called​ ________. A. ER diagramming B. data chop C. normalization D. data vacuum E. data scrubbing

E

EarthLink and NetZero are examples of​ ________. A. databases B. data mining companies C. processing devices D. social media E. Internet service providers

E

On a​ client/server system, most of the powerful processing is handled by the​ ________. A. input devices B. software C. client D. data connection E. server

E

Public key encryption uses​ ________ key(s). A. four B. one C. three D. zero E. two

E

Regarding IS​ security, DoS represents​ ________. A. date of security B. directives of security C. Department of Security D. denial of security E. denial of service

E

SQL stands for​ ________. A. Special Question Language B. Structured Question Language C. Streamlined Question Language D. Structured Questioning Language E. Structured Query Language

E

Software that allows an organization to manage and provide access to data is a​ ________. A. system network B. systems process C. word processor D. spreadsheet E. database management system​ (DBMS)

E

Someone who intends to gain unauthorized access to a computer system is considered to be a​ ________. A. compromiser B. malware specialist C. virus D. Trojan horse E. hacker

E

The formal process to remove data problems such as repeating groups is called​ ________. A. ER Diagramming B. DBMS C. primary key D. data network E. normalization

E

22. ​________ help businesses become more flexible and productive by integrating groups of processes so they focus on efficient management of resources and customer service such as​ sales, marketing, and accounting.

Enterprise resource planning​ (ERP) systems

Record

a group of related fields

Byte

a single character

12. Analytical CRM includes applications that​ ________.

analyze customer data for improving business performance

15. Enterprise applications have drawbacks mainly because they​ ________.

are very expensive to purchase and implement

20. When demand for a product mistakenly gets distorted as it passes across the supply​ chain, it is called a​ ________.

bullwhip effect

23. Customer relationship management primarily includes​ ________.

capturing and integrating customer data

13. Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called​ ________.

customer lifetime value

11. SAP is the​ best-selling ________.

enterprise software

16. In an enterprise​ system, the integrated software modules that focus on customer credit are related to​ ________.

finance and accounting

25. If a supply chain includes organizations from the United States and​ China, it is considered​ a(n) ________.

global supply chain

Field

group of bytes that form a thing (name, place, etc)

File

group of records

10. In an enterprise​ system, the integrated software modules that focus on labor costs and job skills are related to​ ________.

human resources

Database Normalization

making small data structures from complex groups

14. In an enterprise​ system, the integrated software modules that focus on production capacity are related to​ ________.

manufacturing and production

21. Customer relationship management applications that track campaign data are related to the​ ________ aspect of customer relationships.

marketing

24. More advanced CRM applications include​ ________ and​ ________.

partner relationship management​ (PRM); employee relationship management​ (ERM)

Data Redundancy

presence of multiple instances of the same data

5. Customer relationship management applications that track Web sales and retail store sales are related to the​ ________ aspect of customer relationships.

sales

4. In an enterprise​ system, the integrated software modules that focus on return requests are related to​ ________.

sales and marketing

9. Customer relationship management applications that track social networking data are related to the​ ________ aspect of customer relationships.

service

Bit

smallest unit of measure

18. Incorporating applications that allow customers to chat with one another about company products is an example of​ ________.

social CRM

17. A​ ________ is a network of organizations for obtaining raw materials.

supply chain

7. The​ ________ portion of the supply chain includes organizations that supply materials.

upstream

8. An example of​ ________ includes someone taking out a loan and then being sold a checking account as well.

​cross-selling

19. A supply chain management system using​ a(n) ________ model bases production schedules on actual customer orders.

​pull-based

2. If a company produces a​ custom-made automobile only after a customer has placed an​ order, it is an example of a​ ________ production model.

​pull-based

6. A supply chain management system using​ a(n) ________ model bases production schedules on forecasts.

​push-based


Ensembles d'études connexes

Cosmetology State Board Prep (State Laws)

View Set

Chapter 36: Gastrointestinal Intubation and Special Nutritional Modalities

View Set

The Sound and the Fury Quotes Review

View Set