Chapters 5-8 exam MIS
Which of the following enables a DBMS to reduce data redundancy and inconsistency
Ability to minimize isolated files with repeated data
Which of the following techniques stops data packets originating outside the organization, inspects them, and uses a proxy to pass packet information to the other side of an organization's firewall?
Application proxy filtering
Firms that allow employees to use their own devices are embracing which of the following?
BYOD
an approach to data processing focused on the 3 Vs: extreme Volume of data, wide variety of data types and sources, and the velocity at which data must be processed
Big data
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
true
Computers using Chrome OS store both programs and user data on Internet cloud servers.
true
Exponential growth in the number of transistors and the power of processors is expected to decrease in the foreseeable future.
true
In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.
true
NoSQL technologies are useful for accelerating simple queries against large volumes of structured and unstructured data.
true
The term cracker is used to identify a hacker with criminal or malicious intent.
true
The term data governance encompasses policies and procedures through which data can be managed as an organizational resource.
true
Virtualization has become one of the principal technologies for promoting green computing.
true
an authentication system in which a user must provide two types of identification
two-factor authentication
a method of computing that enables a single physical resource to appear as multiple logical resources
virtualization
Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?
war driving
a security hole in software that is unknown to the softwares creator at the time of discovery
zero - day vulnerability
a condition in a database in which the same data are duplicated in multiple parts of the database
Data redundancy
Computer networks are based on the same principles as traditional telephone networks.
False
Web browser software requests web pages from the Internet using which of the following protocols?
HTTP
a protocol used by web browser software to request web pages from the internet
Hypertext transfer protocol (HTTP)
Which of the following is not one of the benefits of a blockchain database?
It enables the ability to use relational databases.
Which type of network is used to connect digital devices within a city or metropolitan area?
MAN
The notion that computer power doubles about every 18 months
Moores law
________ uses individual atoms and molecules to create computer chips and other devices.
Nanotechnology
a standard set of rules and procedures for control of communications in a network.
Network protocol
Which of the following pulls content from websites and feeds it automatically to users' computers?
RSS
Which of the following is not one of the current software platform trends?
Software-defined storage
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption
A network that covers entire geographical regions
Wide-area network (WAN)
an operating system used by nearly 88% of PCs
Windows operating system
A distributed data base technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority
blockchain
All of the following are currently being used as human traits that can be profiled by biometric authentication except:
body odor.
a distributed computing model where clients are linked to one another through a network controlled by a server
client/server computing
a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualization resources over a network
cloud computing
a type of it infrastructure service that stores and manages corporate data and provides capabilities for analyzing the data
data management
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
DBMSs typically include report generating tools in order to:
display data in a more structured and polished format than would be possible just by querying.
a method of optimizing cloud computing systems by performing some data processing on a set of linked servers at the edge of the network
edge computing
IT infrastructure consists of only those physical computing devices and software required to operate the enterprise.
false
In a client/server network, the client sets the rules of communication for the network.
false
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.f
false
Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine.
false
Use of standalone server computers is increasing as organizations transition to cloud computing services.
false
a technology (hardware or software) that allows an organization to prevent unauthorized communication into and out of its network
firewall
A common field that links two different tables and serves as a primary key to one of these tables is called the:
foreign key.
a set of practices and technologies to minimize the environmental effects of manufacturing and managing computing devices
green computing
a page description language for specifying how text,, graphics, video, and sound are placed on a web page and for creating dynamic links to other pages and objects
hypertext markup language (HTML)
Companies that own Internet backbone networks are called:
network service providers.
a database management system that uses a flexible data model and is designed for managing large data sets across many distributed machines
non relational database management systems
a type of software created and updated by a worldwide community of programers and available for free
open source software
The practice of contracting custom software development to an outside firm
outsourcing
the practice of living digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations
packet switching
A DBMS makes the:
physical database available for different logical views.
a computing model that uses the principles of quantum physics to represent data and perform operations on these data
quantum computing
malware that hijacks a users computer and demands payment in return for giving back access
ransomware
CryptoLocker is an example of which of the following?
ransomware/trojan
A(n) ________ represent data as two-dimensional tables.
relational DBMS
a type of database system that represents data as two-dimensional tables
relational database management system (RDBMS)
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data.
tricking people into recreating their passwords or other valuable info by pretending to be legitimate users or members of a company in need of information
social engineering
All of the following are cloud computing services except:
system integration services.
the internet is based on their networking protocol suite
Transmission control protocol/internet protocol (TCP/IP)
OLAP can manage and handle queries with very large sets of data.
True
SaaS business models are one of the trends leading toward a future web.
True
Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.
True
web address that combines a protocol prefix, a domain name, a directory path, and a document name
Uniform resource locator (URL)
a secure, encrypted, private network that has been configured within a public network to take advantage of the economics of scale and management facilities of large networks, such as the internet
Virtual private network (VPN)