Chapters 5-8 exam MIS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following enables a DBMS to reduce data redundancy and inconsistency

Ability to minimize isolated files with repeated data

Which of the following techniques stops data packets originating outside the organization, inspects them, and uses a proxy to pass packet information to the other side of an organization's firewall?

Application proxy filtering

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

an approach to data processing focused on the 3 Vs: extreme Volume of data, wide variety of data types and sources, and the velocity at which data must be processed

Big data

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

true

Computers using Chrome OS store both programs and user data on Internet cloud servers.

true

Exponential growth in the number of transistors and the power of processors is expected to decrease in the foreseeable future.

true

In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.

true

NoSQL technologies are useful for accelerating simple queries against large volumes of structured and unstructured data.

true

The term cracker is used to identify a hacker with criminal or malicious intent.

true

The term data governance encompasses policies and procedures through which data can be managed as an organizational resource.

true

Virtualization has become one of the principal technologies for promoting green computing.

true

an authentication system in which a user must provide two types of identification

two-factor authentication

a method of computing that enables a single physical resource to appear as multiple logical resources

virtualization

Which of the following refers to eavesdroppers driving by buildings or parking outside and trying to intercept wireless network traffic?

war driving

a security hole in software that is unknown to the softwares creator at the time of discovery

zero - day vulnerability

a condition in a database in which the same data are duplicated in multiple parts of the database

Data redundancy

Computer networks are based on the same principles as traditional telephone networks.

False

Web browser software requests web pages from the Internet using which of the following protocols?

HTTP

a protocol used by web browser software to request web pages from the internet

Hypertext transfer protocol (HTTP)

Which of the following is not one of the benefits of a blockchain database?

It enables the ability to use relational databases.

Which type of network is used to connect digital devices within a city or metropolitan area?

MAN

The notion that computer power doubles about every 18 months

Moores law

________ uses individual atoms and molecules to create computer chips and other devices.

Nanotechnology

a standard set of rules and procedures for control of communications in a network.

Network protocol

Which of the following pulls content from websites and feeds it automatically to users' computers?

RSS

Which of the following is not one of the current software platform trends?

Software-defined storage

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Symmetric key encryption

A network that covers entire geographical regions

Wide-area network (WAN)

an operating system used by nearly 88% of PCs

Windows operating system

A distributed data base technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central authority

blockchain

All of the following are currently being used as human traits that can be profiled by biometric authentication except:

body odor.

a distributed computing model where clients are linked to one another through a network controlled by a server

client/server computing

a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of virtualization resources over a network

cloud computing

a type of it infrastructure service that stores and manages corporate data and provides capabilities for analyzing the data

data management

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

DBMSs typically include report generating tools in order to:

display data in a more structured and polished format than would be possible just by querying.

a method of optimizing cloud computing systems by performing some data processing on a set of linked servers at the edge of the network

edge computing

IT infrastructure consists of only those physical computing devices and software required to operate the enterprise.

false

In a client/server network, the client sets the rules of communication for the network.

false

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.f

false

Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine.

false

Use of standalone server computers is increasing as organizations transition to cloud computing services.

false

a technology (hardware or software) that allows an organization to prevent unauthorized communication into and out of its network

firewall

A common field that links two different tables and serves as a primary key to one of these tables is called the:

foreign key.

a set of practices and technologies to minimize the environmental effects of manufacturing and managing computing devices

green computing

a page description language for specifying how text,, graphics, video, and sound are placed on a web page and for creating dynamic links to other pages and objects

hypertext markup language (HTML)

Companies that own Internet backbone networks are called:

network service providers.

a database management system that uses a flexible data model and is designed for managing large data sets across many distributed machines

non relational database management systems

a type of software created and updated by a worldwide community of programers and available for free

open source software

The practice of contracting custom software development to an outside firm

outsourcing

the practice of living digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations

packet switching

A DBMS makes the:

physical database available for different logical views.

a computing model that uses the principles of quantum physics to represent data and perform operations on these data

quantum computing

malware that hijacks a users computer and demands payment in return for giving back access

ransomware

CryptoLocker is an example of which of the following?

ransomware/trojan

A(n) ________ represent data as two-dimensional tables.

relational DBMS

a type of database system that represents data as two-dimensional tables

relational database management system (RDBMS)

The Gramm-Leach-Bliley Act:

requires financial institutions to ensure the security of customer data.

tricking people into recreating their passwords or other valuable info by pretending to be legitimate users or members of a company in need of information

social engineering

All of the following are cloud computing services except:

system integration services.

the internet is based on their networking protocol suite

Transmission control protocol/internet protocol (TCP/IP)

OLAP can manage and handle queries with very large sets of data.

True

SaaS business models are one of the trends leading toward a future web.

True

Sniffers enable hackers to steal proprietary information from anywhere on a network, including email messages, company files, and confidential reports.

True

web address that combines a protocol prefix, a domain name, a directory path, and a document name

Uniform resource locator (URL)

a secure, encrypted, private network that has been configured within a public network to take advantage of the economics of scale and management facilities of large networks, such as the internet

Virtual private network (VPN)


संबंधित स्टडी सेट्स

Pediatric/Child Health Nursing - Infants - Exam 1

View Set

LP 3: Critical Care (burns, shock, ventilation, heart surgery)

View Set

The Historian's Task in the Philippines

View Set

AP Bio - Unit 8 Review Questions

View Set

Chapter 12: From Gene to Protein

View Set