chap 5-8 cis2050

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An intrusion detection system​ (IDS) ________.

helps protect a system using​ full-time monitoring tools

The domain extension .mil represents​ ________.

the U.S. Military

A​ ________ is a software program that mimics another program and often causes damage.

trojan horse

Regarding the IT infrastructure​ ecosystem, data management includes​ ________. A. SAP B. ​Oracle, SQL​ Server, and MySQL Your answer is correct.C. ​Unix, Linux, and Mac OS X D. Cisco E. Accenture

​Oracle, SQL​ Server, and MySQL

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized​ information, they are​ ________.

. phishing

The size of a nanotube is about​ ________ thinner than a human hair.A. ​1,000 times B. 5 times C. 100 times D. ​10,000 times Your answer is correct.E. ​100,000 times

10,000 times

​________ is the standard for wireless technologies.

802.11

Bluetooth is another name for the​ ________ wireless networking standard.

802.15

Amazon is one of the first to provide cloud computing relational databases. This effort is called​ ________.

Amazon Relational Database Service

​________ is used to ensure the person is who​ he/she claims to be.

Authentication

For​ DBMS's that do NOT include a reports​ generator, ________ is a popular option for large corporate DBMS. A. MySQL B. Spreadsheets C. DB2 D. QuickBooks E. Crystal Reports

Crystal Reports

________ are data files used to identify and protect online transactions using a trusted third party.

Digital certificates

​________ was passed in 1996 to protect medical records.

HIPAA

EarthLink and NetZero are examples of​ ________.

Internet service providers

SQL stands for​ ________. A. Streamlined Question Language B. Special Question Language C. Structured Query Language Your answer is correct.D. Structured Questioning Language E. Structured Question Language

Structured Query Language

​A(n) ________ outlines acceptable uses of information systems assets.

acceptable use policy

Another name for a database field is​ a(n) ________. A. database B. row C. attribute Your answer is correct.D. tuple E. record

attribute

Digital information transfer speeds are measured in​ ________.

bits per second

A​ ________ is a component in the computer system data hierarchy that represents an ASCII character. A. system network B. spreadsheet C. word processor D. database management system​ (DBMS) Your answer is correct.E. systems process

byte

A cloud​ ________. A. is public B. is a production worker C. is private D. is an hourly worker E. can be private or public

can be private or public

Coaxial cable is​ a(n) ________ for linking network components.

connection medium

Data​ cleansing, working to identify and fix incorrect​ data, is also called​ ________.

data scrubbing

Software that allows an organization to manage and provide access to data is a​ ________. A. CloudDB B. Amazon Relational Database Service Your answer is correct.C. Amazon Cloud D. Amazon DBMS E. ConnectDB

database management system​ (DBMS)

​A(n) ________ signal is a​ discrete, binary waveform.

digital

Regarding the IT infrastructure​ ecosystem, SAP is an example of​ ________. A. enterprise software applications Your answer is correct.B. data management C. ​networking/telecommunications D. Internet platforms E. operating systems platforms

enterprise software applications

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A. A. byte B. file C. record D. field Your answer is correct.E. bit

field

IS security firewalls are an example of a​ ________.

gatekeeper

Your​ firm's IT strategy is​ a(n) ________ of the competitive forces model for IT infrastructure. A. internal part Your answer is correct.B. unnecessary part C. both external and internal part D. instructional component E. external part

internal part

Your​ firm's business strategy is​ a(n) ________ of the competitive forces model for IT infrastructure. A. both external and internal part B. instructional component C. unnecessary part D. internal part Your answer is correct.E. external part

internal part

If someone loads a program that tracks everything you​ type, the specific spyware is a​ ________.

key logger

The typical computing configuration in 1960 was​ ________. A. personal computer B. enterprise computing C. mainframe Your answer is correct.D. cloud computing E. ​client/server

mainframe

According to​ McAfee, ________ now pose the greatest security risks.

mobile devices

A​ ________ links two or more computers which enable the sharing of information.

network

Slicing digital messages into parcels is called​ ________.

packet switching

Although​ "Big Data"​ doesn't refer to a specific amount of​ data, it usually does involve​ ________. A. gigabytes B. bits C. petabytes Your answer is correct.D. megabytes E. bytes

petabytes

Another term for a key field is a​ ________. A. surrogate key B. null key C. data key D. primary key Your answer is correct.E. foreign key

primary key

Infrastructure as a service​ (IaaS) provides​ ________. A. software in the cloud B. ​processing, storage, and networking resources Your answer is correct.C. a service that will never be financially viable D. a service still in the experimental stage E. a service that will never reach the market

processing, storage, and networking resources

Google Apps are an example of​ ________. A. software as a product​ (SaaP) B. software as a service​ (SaaS) This is the correct answer.C. platform as a product​ (PaaP) D. infrastructure as a service​ (IaaS) E. platform as a service​ (PaaS)

software as a service​ (SaaS)

​TCP/IP was original developed in the 1970s to support​ ________.

the Department of Defense

​________ computing emerged in 1983. A. Mainframe B. Enterprise C. Cloud D. ​Client/server Your answer is correct.E. Personal computer

​Client/server


संबंधित स्टडी सेट्स

PN Mental Health Online Practice 2020 A with NGN

View Set

Med Term Ch. 11 Gastroenterology ~ Crossword puzzle

View Set