chap 5-8 cis2050
An intrusion detection system (IDS) ________.
helps protect a system using full-time monitoring tools
The domain extension .mil represents ________.
the U.S. Military
A ________ is a software program that mimics another program and often causes damage.
trojan horse
Regarding the IT infrastructure ecosystem, data management includes ________. A. SAP B. Oracle, SQL Server, and MySQL Your answer is correct.C. Unix, Linux, and Mac OS X D. Cisco E. Accenture
Oracle, SQL Server, and MySQL
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ________.
. phishing
The size of a nanotube is about ________ thinner than a human hair.A. 1,000 times B. 5 times C. 100 times D. 10,000 times Your answer is correct.E. 100,000 times
10,000 times
________ is the standard for wireless technologies.
802.11
Bluetooth is another name for the ________ wireless networking standard.
802.15
Amazon is one of the first to provide cloud computing relational databases. This effort is called ________.
Amazon Relational Database Service
________ is used to ensure the person is who he/she claims to be.
Authentication
For DBMS's that do NOT include a reports generator, ________ is a popular option for large corporate DBMS. A. MySQL B. Spreadsheets C. DB2 D. QuickBooks E. Crystal Reports
Crystal Reports
________ are data files used to identify and protect online transactions using a trusted third party.
Digital certificates
________ was passed in 1996 to protect medical records.
HIPAA
EarthLink and NetZero are examples of ________.
Internet service providers
SQL stands for ________. A. Streamlined Question Language B. Special Question Language C. Structured Query Language Your answer is correct.D. Structured Questioning Language E. Structured Question Language
Structured Query Language
A(n) ________ outlines acceptable uses of information systems assets.
acceptable use policy
Another name for a database field is a(n) ________. A. database B. row C. attribute Your answer is correct.D. tuple E. record
attribute
Digital information transfer speeds are measured in ________.
bits per second
A ________ is a component in the computer system data hierarchy that represents an ASCII character. A. system network B. spreadsheet C. word processor D. database management system (DBMS) Your answer is correct.E. systems process
byte
A cloud ________. A. is public B. is a production worker C. is private D. is an hourly worker E. can be private or public
can be private or public
Coaxial cable is a(n) ________ for linking network components.
connection medium
Data cleansing, working to identify and fix incorrect data, is also called ________.
data scrubbing
Software that allows an organization to manage and provide access to data is a ________. A. CloudDB B. Amazon Relational Database Service Your answer is correct.C. Amazon Cloud D. Amazon DBMS E. ConnectDB
database management system (DBMS)
A(n) ________ signal is a discrete, binary waveform.
digital
Regarding the IT infrastructure ecosystem, SAP is an example of ________. A. enterprise software applications Your answer is correct.B. data management C. networking/telecommunications D. Internet platforms E. operating systems platforms
enterprise software applications
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A. A. byte B. file C. record D. field Your answer is correct.E. bit
field
IS security firewalls are an example of a ________.
gatekeeper
Your firm's IT strategy is a(n) ________ of the competitive forces model for IT infrastructure. A. internal part Your answer is correct.B. unnecessary part C. both external and internal part D. instructional component E. external part
internal part
Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure. A. both external and internal part B. instructional component C. unnecessary part D. internal part Your answer is correct.E. external part
internal part
If someone loads a program that tracks everything you type, the specific spyware is a ________.
key logger
The typical computing configuration in 1960 was ________. A. personal computer B. enterprise computing C. mainframe Your answer is correct.D. cloud computing E. client/server
mainframe
According to McAfee, ________ now pose the greatest security risks.
mobile devices
A ________ links two or more computers which enable the sharing of information.
network
Slicing digital messages into parcels is called ________.
packet switching
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________. A. gigabytes B. bits C. petabytes Your answer is correct.D. megabytes E. bytes
petabytes
Another term for a key field is a ________. A. surrogate key B. null key C. data key D. primary key Your answer is correct.E. foreign key
primary key
Infrastructure as a service (IaaS) provides ________. A. software in the cloud B. processing, storage, and networking resources Your answer is correct.C. a service that will never be financially viable D. a service still in the experimental stage E. a service that will never reach the market
processing, storage, and networking resources
Google Apps are an example of ________. A. software as a product (SaaP) B. software as a service (SaaS) This is the correct answer.C. platform as a product (PaaP) D. infrastructure as a service (IaaS) E. platform as a service (PaaS)
software as a service (SaaS)
TCP/IP was original developed in the 1970s to support ________.
the Department of Defense
________ computing emerged in 1983. A. Mainframe B. Enterprise C. Cloud D. Client/server Your answer is correct.E. Personal computer
Client/server