CIS Test 2
Select all that apply Select the three primary wireless business applications. Multiple select question. - WPA - GPS - WEP - GIS - RFID
- GPS - GIS - RFID
Select all that apply Select the four key areas of technology recovery strategies. Multiple select question. - Business continuity plan - Client/Server - Hardware - Data center - Networking - Software
- Hardware - Data Center - Networking - Software
Select all that apply Select two items a disaster recovery cost curve charts. Multiple select question. - The cost to the company of replacing the enterprise architect. - The cost to the company of recovering from a disaster over time. - The cost to the company of hiring new employees. - The cost to the company of the unavailability of information and technology
- The cost to the company of recovering from a disaster over time - The cost to the company of the unavailability of information and technology
Select all that apply Which of the following are answers to tough business questions BI can answer? (Choose all that apply) Multiple select question. - Where is the business going? - What is the best selling product? - Who is the best sales representative? - Where has the business been? - Where is the business now?
- Where is the business going? - Where has the business been? - Where is the business now
Select all that apply Select three information MIS infrastructure components. Multiple select question. - Cloud computing - Business continuity planning - Disaster recovery - Accessibility - Backup
- business continuity plan - disaster recovery - backup
Select all that apply List the three primary elements of an information MIS infrastructure. Multiple select question. - Grid computing plan - Business continuity plan - Cloud computing plan - Disaster recovery plan - Backup and recovery plan
- business continuity plan - disaster recovery plan - backup and recovery plan
Select all that apply Identify the three mobile device management policies. Multiple select question. - Choose Your Own Device - Bring Your Own Device - Dual Persona Technology - Company-Issued, Personally Enabled - Containerization
- choose your own device - bring your own device - company-issued, personally enabled
Select all that apply Select two terms that describe the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete data. Multiple select question. - Data cube - Data key - Data cleansing - Data integrity - Data scrubbing
- data cleaning - data scrubbing
Select all that apply Select the four primary traits of the value of data. Multiple select question. - Data level - Data quality - Data governance - Data timeliness - Data type - Data granularity
- data quality - data governance - data timeliness - data type
Select all that apply Select the four business continuity planning focus areas. Multiple select question. - Employee accessibility plan - Emergency notification systems - Business impact analysis - Cloud computing impact analysis - Disaster recovery plan - Technology recovery strategies
- emergency notification systems - business impact analysis - disaster recovery plan - technology recovery strategies
Select all that apply Select the three ways a data center can become more sustainable. Multiple select question. - Find locations where resources are inexpensive, clean, and available - Store greater amounts of information in less space - Find locations where resources are expensive, clean, and unavailable - Store fewer amounts of information in less space - Increase energy consumption - Reduce energy consumption
- find locations where resources are inexpensive, clean, and available - store greater amounts of information in less space - reduce energy consumption
Select all that apply Select the three terms that identify the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Multiple select question. - Geographic information - Geospatial data - Edge matching - Spatial data - Rubber sheeting
- geographic information - geospatial data - spatial data
Select all that apply Select the three benefits of cloud services. Multiple select question. - Improved accessibility - Greater reliability - Higher availability - Less reliability - Lower availability - Less efficient accessibility
- improved accessibility - greater reliability - higher availability
Select all that apply Which of the following are problems associated with dirty data? (Choose all that apply) Multiple select question. - Incorrect data - Accurate data - Non-formatted data - Duplicate data - Integrated data
- incorrect data - non-formatted data - duplicate data
Select all that apply Select the three primary side effects of businesses' expanded use of technology. Multiple select question. - Reduced electronic waste - Reduced energy consumption - Reduced carbon emissions - Increased carbon emissions - Increased electronic waste - Increased energy consumption
- increased carbon emission - increased electronic waste - increased energy consumption
Select all that apply Select three measurements of bandwidth. Multiple select question. - DSL - T1 - Dial-up - Kilobits - Megabits - Gigabits - Cable
- kilobits - megabits - gigabits
Select all that apply Select three common uses of GIS in a business. Multiple select question. - Updating website publishing - Mapping quantities - Finding what is nearby - Sending information alerts - Advanced connectivity and capacity
- mapping quantities - finding what is nearby - sending information alerts
Select all that apply Identify the three primary areas of an enterprise mobility strategy. Multiple select question. - Pervasive computing management - Mobile information management - Mobile device management - Dual persona technology - Mobile application management - IT consumerization management
- mobile information management - mobile device management - mobile application management
Select the four primary reasons low-quality data occurs in a system. Multiple select question. - Third-party and external data contains inconsistencies and errors. - Data-entry personnel enter inaccurate data to receive higher bonuses. - Different systems use consistent data entry standards and formats. - Data-entry personnel enter abbreviated data to save time. - Different systems have different data entry standards and formats. - Online customers intentionally enter inaccurate data to protect their privacy.
- third-party and external data contains inconsistencies and errors - data-entry personnel enter abbreviated data to save time - different systems have different data entry standards and formats - online customers intentionally enter inaccurate data to protect their privacy
Select all that apply Select the four functions that a database management system can perform on data in a database? Multiple select question. - Govern data - Update data - Create data - Delete data - Analyze data - Read data
- update data - create data - delete data - read data
Select all that apply List three sustainable MIS infrastructure components. Multiple select question. - Availability - Virtualization - Cloud computing - Business continuity planning - Grid computing
- virtualization - cloud computing - grid computing
Select all that apply Select three terms that represent the event that occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Multiple select question. - Warping - Edge matching - Geographic information - Rubber sheeting - Geospatial data
- warping - edge matching - rubber sheeting
Select the statement below that accurately reflects a database. Multiple choice question. - While a database has only one physical view, it can easily support multiple logical views that provides for flexibility. - While a database has only one logical view, it can easily support multiple physical views that provides for flexibility - A database has only one physical view and one logical view.
- while a database has only one physical view, it can easily support multiple logical views that provides for flexibility
Select all that apply Select the two accurate statements about mobility and wireless communications. Multiple select question. - Wireless refers to any type of operation accomplished without the use of a hard-wired connection. - Wireless means the technology can travel with the user - Mobile means the technology can travel with the user. - Mobile refers to any type of operation accomplished without the use of a hard-wired connection.
- wireless refers to any type of operation accomplished without the use of a hard-wired connection - mobile means the technology can travel with the user
the original analog cell phone network
1G
digital cell phone service
2G
broadband internet services over cellular networks; added MMS (multimedia message services) or pictures message services
3G
high-speed access, anywhere, anytime, to anything digital - audio, video, text
4G
What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?
5G
superior data communication rate; expected to provide artificial intelligence capabilities on wearable devices
5G
___________ uses GPS tracking to track vehicles. (use acronym)
AVL
_________ MIS Infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.
Agile
__________ is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.
Bluetooth
multi tenancy, off-premise, several organizations, Hospital
Community cloud
____________ is the time of day of an expected arrival at a certain destination and is typically used for navigation applications. (Please use the acronym)
ETA
_________ is the time remaining before reaching a destination using the present speed and is typically used for navigation applications. (Please use the acronym)
ETE
A(n) ________ stores, views, and analyzes geographic data creating, multidimensional charts or maps.
GIS
What links business assets to a centralized system where they can be tracked and monitored over time?
GIS map automation
______ consumerization is the blending of personal and business use of technology devices and applications.
IT
What is the blending of personal and business use of technology devices and applications?
IT consumerization
Wireless _________ is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.
LAN
____________ applications use location information to provide a service. (use acronym)
LBS
Which technology has multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices?
MIMO
What includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets?
MIS infrastructure
_______ Law refers to the computer chip performance per dollar doubles every 18 months.
Moores
What provides communication for devices owned by a single user that work over a short distance?
PAN
What uses electronic tags and labels to identify objects wirelessly over short distances?
RFID
What is a transmitter/receiver that reads the contents of RFID tags in the area?
RFID reader
What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?
SHTTP or HTTPS
___________ is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private. (Please use the acronym)
SSL
What requires an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company?
SSL certificate
What uses IP technology to transmit telephone calls?
Voice over IP (VoIP)
What is an encryption algorithm designed to protect wireless transmission data?
WEP
What is a wireless security protocol to protect Wi-Fi networks?
WPA
_______ is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.
WiMAX
What spans a large geographic area such as a state, province, or country?
Wide area network
The RFID ____________ is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.
accelerometer
What is a device that can measure the force of acceleration, whether caused by gravity or by movement?
accelerometer
What is the computer or network device that serves as an interface between devices and the network?
access point
Web ___________ initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities.
accessibility
___________ refers to the varying levels that define what a user can access, view, or perform when operating a system.
accessibility
Is there an incorrect value in the data?
accurate
A(n) _______ is an entity that is capable of participating in an action or a network.
actor
What is an entity that is capable of participating in an action or a network?
actor
IP __________ is a unique number that identifies where computers are located on the network.
address
___________ access is unrestricted access to the entire system.
administrator
Data _______ is the collection of data from various sources for the purpose of data processing.
aggregation
What occurs when the user goes into an emotional state of over analyzing (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome?
analysis paralysis
encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks
analytical data
Mobile _________ management is a security strategy that administers and enforces corporate epolicies for applications on mobile devices.
application
An enterprise ___________ is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.
architect
A data _________ is a business analytics specialist who uses visual tools to help people understand complex data.
artist
___________ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.
asset
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls?
attenuation
____________ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.
attenuation
___________ refers to the time frames when the system is operational.
availability
A ________ is an exact copy of a system's information.
backup
What is the maximum amount of data that can pass from one point to another in a unit of time?
bandwidth
__________ is the maximum amount of data that can pass from one point to another in a unit of time.
bandwidth
____________ measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time.
bandwidth
What offers a cloud-based Big Data service to help organizations analyze massive amounts of data to solve business dilemmas?
big data as a service
A(n) _________ is the smallest element of data and has a value of either 0 or 1.
bit
What is the smallest element of data and has a value of either 0 or 1?
bit
____ rate is the number of bits transferred or received per unit of time.
bit
________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.
bitcoin
What is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?
blockchain
A blockchain is formed by linking together ___________, data structures containing a hash, previous hash, and data.
blocks
employees use their own device
bring your own device
______ is a high-speed Internet connection that is always connected.
broadband
What is another name for cable modem?
broadband modem
What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems?
broadband over power line (BPL)
Cloud __________ is when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes.
bursting
What identifies all critical business functions and the effect that a specific disaster may have upon them?
business impact analysis
The problem of being data rich and information poor results from an inability to turn business data into ______.
business intelligence
What defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer?
business rule
What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
business-critical integrity constraints
What is a type of digital modem used with high-speed cable Internet service?
cable modem
__________ planning determines future environmental infrastructure requirements to ensure high-quality system performance.
capacity
___________ represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents its size or volume.
capacity
What determines future environmental infrastructure requirements to ensure high-quality system performance?
capacity planning
_______ emissions includes the carbon dioxide and carbon monoxide produced by business processes and systems.
carbon
___________ is the science and art of making an illustrated map or chart.
cartography
War ____________ is the practice of tagging pavement with codes displaying where Wi-Fi access is available.
chalking
____________ RFID tags use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.
chipless
employees choose a company approved and configured device
choose your own device
________ computing is a subset of sustainable MIS which refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.
clean
A(n) ___________ is a computer designed to request information from a server.
client
What is a computer designed to request information from a server?
client
What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes?
cloud bursting
What stores, manages, and processes data and applications over the Internet rather than on a personal computer or server?
cloud computing
What is the software that makes possible the benefits of cloud computing, such as multi-tenancy?
cloud fabric
What is a nonprofit organization that promotes research into best practices for securing cloud computing and cloud delivery models?
cloud security alliance
A(n) _________ site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
cold
a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
cold site
____________ cloud serves a specific community with common business models, security requirements, and compliance considerations.
community
employees provided with corporate devices
company issued, personally enabled
What can compare two or more datasets to identify patterns and trends?
comparative analysis
_________ monitoring occurs when a company keeps tabs of competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.
competitive
Is a value missing from the data?
complete
Is aggregate or summary data in agreement with detailed data?
consistent
Energy ___________ is the amount of energy consumed by business processes and systems.
consumption
What isolates corporate applications from personal applications on a device?
containerization
Business ____________ planning details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.
continuity
A cloud fabric ___________ is an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company.
controller
Network ________ is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures.
convergence
What is a company's acknowledged responsibility to society?
corporate social responsibility
A data _______ is the common term for the representation of multidimensional data.
cube
Business intelligence ________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.
dashboards
A __________ center is a facility used to house management information systems and associated components, such as telecommunications and storage systems.
data
A bad actor is an entity that is participating with ill-intentions. Users have no way to ensure that a bad actor is on the network intercepting, reading, or modifying __________.
data
transactional data sender, receiver, number of coins
data
facilitates the accessibility of business-critical data in a timely, secure, and affordable manner
data as a service (DaaS)
What is the common term for the representation of multidimensional data?
data cube
What is the smallest or basic unit of data?
data element
Select a term that is a synonym for data element, the smallest or basic unit of data in a database.
data field
What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?
data gap analysis
What is a measure of the quality of data?
data integrity
What is a storage repository that holds a vast amount of raw data in its original format until the business needs it?
data lake
What is the time it takes for data to be stored or retrieved?
data latency
What contains a subset of data warehouse data?
data mart
What is an individual item on a graph or a chart?
data point
What is the duplication of data, or the storage of the same data in multiple places?
data redundancy
Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.
data rich and information poor
What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?
data stewardship
A(n) _________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
database
What maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)?
database
What creates, reads, updates, and deletes data in a database while controlling access and security?
database management system
What is an organized collection of data?
dataset
Data-driven _______ management is an approach to business governance that values decisions that can be backed up with verifiable data.
decision
A data ____________ compiles all of the metadata about the data elements in the data model.
dictionary
_________ subscriber line (DSL) provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines.
digital (DSL)
What is a worldwide gap giving advantage to those with access to technology?
digital divide
What provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines?
digital subscriber line (DSL)
What is erroneous or flawed data?
dirty data
A ___________ recovery plan is a detailed process for recovering information or a system in the event of a catastrophic disaster.
disaster
__________ Recovery as a Service (DRaaS) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster.
disaster
_________ computing processes and manages algorithms across many machines in a computing environment.
distributed
What processes and manages algorithms across many machines in a computing environment?
distributed computing
What converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions?
domain name system (DNS)
War ________ is deliberately searching for Wi-Fi signals while driving by in a vehicle.
driving
What creates two completely separate user interfaces one the same device, one for work and one for personal use?
dual persona technology
_________ scaling means the MIS infrastructure can be automatically scaled up or down based on needed requirements
dynamic
What allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network?
dynamic host configuration protocol (DHCP)
What means the MIS infrastructure can be automatically scaled up or down based on needed requirement?
dynamic scaling
A(n) __________ is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property.
emergency
What is an infrastructure built for notifying people in the event of an emergency?
emergency notification system
What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets?
enterprise mobility management
Attributes are the data elements associated with an ________.
entity
Select the term that refers to the table used to store data about a person, place, thing, transaction, or event.
entity
Which data element stores a single piece of data about a person, place, thing, transaction, or event?
entity
What refers to discarded, obsolete, or broken electronic devices?
ewaste
___________, transformation, and loading is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
extraction
What is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers?
extranet
The cloud ___________ is the software that makes possible the benefits of cloud computing, such as multi-tenancy.
fabric
___________ occurs when the primary machine recovers and resumes operations, taking over from the secondary server.
failback
What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server?
failover
A technology _________ occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage.
failure
What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?
fast data
__________ tolerance is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.
fault
______ transfer protocol is a simple network protocol that allows the transfer of files between two computers on the Internet.
file (FTP)
Packet _______ represents the end of the packet or transmission end.
footer
A data ________ analysis occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist.
gap
What is the first block created in the blockchain?
genesis block
__________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.
geocache
What is a coding process in spatial databases that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)?
geocoding
What term describes a round coin-sized object that is uniquely numbered and hidden in geocache?
geocoin
What stores, views, and analyzes geographic data creating, multidimensional charts or maps?
geographic information system (GIS)
What is a satellite-based navigation system providing extremely accurate position, time, and speed information?
global positioning system (GPS)
A _________ personal computer is built using environment friendly materials and designed to save energy.
green
What is built using environment friendly materials and designed to save energy?
green personal computer
________ computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.
grid
_________ consists of the physical devices associated with a computer system, and software is the set of instructions the hardware executes to carry out specific tasks.
hardware
A _____ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.
hash
the blocks unique identifier like a fingerprint
hash
_________-speed Internet cable connections provides Internet access using a cable television company's infrastructure and a special cable modem.
high
____________ availability occurs when a system is continuously operational at all times.
high
What provides Internet access using a cable television company's infrastructure and a special cable modem?
high-speed Internet cable connections
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?
hot site
a separate and fully equipped facility where the company can move immediately after a disaster and resume business
hot site
What are designated locations where Wi-Fi access points are publicly available?
hotspots
What is the correlation between Moore's law and energy consumption?
huge increases in technology from Moore's law have greatly amplified energy consumption
___________ cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability.
hybrid
mix of private, public, and community
hybrid cloud
What uses both on-site and off-site resources to store corporate data?
hybrid cloud storage
What is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?
identity management
What simply means unchangeable?
immutable
Users could not get the data they needed; what was collected was not always useful for intended purposes.
inadequate data usefulness
What is the term that refers to an unplanned interruption of a service?
incident
What is the process responsible for managing how incidents are identified and corrected?
incident management
Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.
inconsistent data definitions
A data point is an _________ item on a graph or a chart.
individual
Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.
ineffective direct data access
What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?
infographics
Wi-Fi ____________ includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal.
infrastructure
offers computer hardware and networking equipment on a pay-per-use basis
infrastructure as a service (IaaS)
What are rules that help ensure the quality of data?
integrity contraints
What distributes digital video content using IP across the Internet and private IP networks?
internet protocol TV (IPTV)
What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes?
intranet
_________ is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.
intranet
Managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels.
lack of data standards
__________ represents a north/south measurement of position.
latitude
Usability is the degree to which a system is easy to _______ and efficient and satisfying to use.
learn
A _______ records classified and summarized transactional data
ledger
What connects a group of computers in close proximity, such as in an office building, school, or home?
local area network
Which applications use location information to provide a service?
location-based services
What represents an east/west measurement of position?
longitude
What refers to how quickly a system can transform to support environmental changes?
maintainability
Identity ____________ is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
management
_________ data management is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems.
master
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
master data management
___________ provides details about data.
metadata
A(n) _________ area network is a large computer network usually spanning a city.
metropolitan
A(n) ___________ area network is a large computer network usually spanning a city.
metropolitan
What is the set of processes and procedures involved in writing software for use on wireless devices?
mobile application development
What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?
mobile application management
What is the ability to purchase goods and services through a wireless Internet-enabled device?
mobile business
What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?
mobile device management
What is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it?
mobile information management
A(n) _______ is a device that enables a computer to transmit and receive data.
modem
What is a device that enables a computer to transmit and receive data?
modem
____________ -tenancy in the cloud means that a single instance of a system serves multiple customers.
multi
What is about ensuring that everyone has equal access to the Internet?
net neutrality
DSL, cable modem, broadband
network access technologies
VoIP, UC, IPTV
network convergence
What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?
network convergence
TCP/IP, FTP, DHCP
network protocols
ISP, NSP, RSP
network providers
What combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device?
network virtualization
LAN, WAN, MAN
networking categories
What refers to a multi-tenancy co-tenant that monopolizes bandwidth, servers, CPUs, and other resources that cause network performance issues?
noisy neighbor
One primary goal of a database is to eliminate data redundancy by recording each piece of data in _______ place(s) in the database.
only one
What is a single unit of binary data routed through a network?
packet
What lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data?
packet header
_________ RFID tags do not have a power source, whereas active RFID tags have their own transmitter and a power source (typically a battery).
passive
______________ is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.
peer-to-peer (P2P)
What measures how quickly a system performs a process or transaction?
performance
A(n) __________ area network provides communication for devices owned by a single user that work over a short distance.
personal
_________ computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
pervasive
offers hardware, networking, and applications on a pay-per-use basis
platform as a service (PaaS)
The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions.
poor data quality
What refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?
portability
Emergency ___________ ensures a company is ready to respond to an emergency in an organized, timely, and effective manner.
preparedness
hash of the previous block in the blockchain
previous hash
A(n) ________ key is a field (or group of fields) that uniquely identifies a given record in a table.
primary
What is a field that uniquely identifies a given record in a table?
primary key
_________ cloud serves only one customer or organization and can be located on the customer's premises or off the customer's premises.
private
single tenancy, on-premise, one organization, Bank
private cloud
A __________ web application is a website that looks and behaves as if it is a mobile application but it is just a normal website.
progressive
What is a way to validate transactions and achieve the distributed consensus?
proof-of-stake
Wi-Fi __________ access is a wireless security protocol to protect Wi-Fi networks.
protected
_________ is a standard that specifies the format of data as well as the rules to be followed during transmission.
protocol
What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?
proxy
_________ cloud promotes massive, global, and industrywide applications offered to the general public.
public
multi tenancy, off-premise, Amazon EC2
public cloud
Many firms complete data ___________ audits to determine the accuracy and completeness of its data.
quality
A(n) ___________ -by-example tool helps users graphically design the answer to a question against a database.
query
Which tool helps users graphically design the answer to a question against a database?
query-by-example
A _______ access network is a technology that connects individual devices to other parts of a network through radio connections.
radio
What is a technology that connects individual devices to other parts of a network through radio connections?
radio access network
_______ data is data that has not been processed for use.
raw
What is data that has not been processed for use?
raw data
Which system provides real-time data in response to requests?
real-time
A(n) _________ is a collection of related data elements.
record
An incident ___________ contains all of the details of an incident.
record
Technology _________ strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements.
recovery
What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?
recovery
What offers Internet service by connecting to NSPs, but they also can connect directly to each other?
regional service providers
__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.
relational
Which of the following are rules that enforce basic and fundamental information-based constraints, such as not creating an order for a nonexistent customer?
relational integrity constraints
___________ ensures a system is functioning correctly and providing accurate information.
reliability
A(n) __________ receives and repeats a signal to extend its attenuation or range.
repeater
What receives and repeats a signal to extend its attenuation or range?
repeater
Containerization isolates corporate applications from personal applications on a device. What is another name for containerization?
sandboxing
What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?
satellite
What describes how well a system can scale up, or adapt to the increased demands of growth?
scalability
involves applications such as anti-virus software delivered over the Internet with constant virus definition updates that are not reliant on user compliance
security as a service (SaaS)
___________ -passive RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
semi
A(n) _______ is a computer dedicated to providing information in response to requests.
server
__________ virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications.
server
___________ is how quickly a third party can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability.
serviceability
System virtualization is the ability to present the resources of a _______ computer as if it is a collection of separate computers ("virtual machines"), each with its own virtual CPUs, network interfaces, storage, and operating system?
single
What implies that each customer or tenant must purchase and maintain an individual system?
single-tenancy
___________ offer more advanced computing ability and connectivity than basic cell phones.
smartphones
___________ as a Service delivers applications over the cloud using a pay-per-use revenue model.
software
offers applications on a pay-per-use basis
software as a service (SaaS)
_____ data identifies the primary location where data is collected.
source
What identifies the primary location where data is collected?
source data
Proof-of-______ is a way to validate transactions and achieve the distributed consensus.
stake
______ packet formats include a packet header, packet body containing the original message, and packet footer.
standard
What includes a packet header, packet body containing the original message, and packet footer?
standard packet formats
Data ___________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.
stewardship
______ virtualization combines multiple network storage devices so they appear to be a single storage device.
storage
What combines multiple network storage devices so they appear to be a single storage device?
storage virtualization
What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred?
streaming
_____ data is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.
streaming
What refers to the safe disposal of MIS assets at the end of their life cycle?
sustainable MIS disposal
What identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption?
sustainable MIS infrastructure
An RFID ________ is an electronic identification device that is made up of a chip and antenna.
tag
A data map is a technique for establishing a match, or balance, between the source data and the ______ data warehouse.
target
What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?
technology failure
What allows users to work from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data?
telecommuting (virtual workforce)
Is the data current with respect to business needs?
timely
What is a utility application that monitors the network path of packet data sent to a remote computer?
traceroute
____________ is a utility application that monitors the network path of packet data sent to a remote computer.
traceroute
encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks
transactional data
What provides the technical foundation for the public Internet as well as for large numbers of private networks?
transmission control protocol/Internet protocol (TCP/IP)
True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.
true
True or false: Cloud computing offers new ways to store, access, process, and analyze information and connect people and resources from any location in the world where an Internet connection is available. For this reason cloud computing offers greater sustainability.
true
True or false: Companies should choose a backup and recovery strategy in line with their goals and operational needs.
true
True or false: Gender, for instance can be referred to in many ways (Male, Female, M/F, 1/0), but it should be standardized on a data warehouse with one common way of referring to each data element that stores gender (M/F).
true
True or false: The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and cloud delivery models. CSA offers tools, documentation, and reports on cloud computing services, security education, and security best practices for implementing cloud models.
true
True or false: The characteristics of agile MIS infrastructures can help ensure your systems can meet and perform under any unexpected or unplanned changes.
true
True or false: Virtualization is also one of the easiest and quickest ways to achieve a sustainable MIS infrastructure because it reduces power consumption and requires less equipment that needs to be manufactured, maintained, and later disposed of safely. Managers no longer have to assign servers, storage, or network capacity permanently to single applications. Instead, they can assign the hardware resources when and where they are needed, achieving the availability, flexibility, and scalability a company needs to thrive and grow.
true
What is a system called when it is not operating and cannot be used?
unavailable
What is the integration of communication channels into a single service?
unified communications (UC)
offers enterprise communication and collaboration services over the Internet such as instant messaging systems, online meeting, and video conferencing
unified communications as a service (UCaaS)
Is each transaction and event represented only once in the data?
unique
An _______ reuses or refurbishes ewaste and creates a new product.
upcycle
What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?
utility computing
Why does a database offer increased information security?
various security features of databases ensure that individuals have only certain types of access to certain types of data
A(n) ________ private network occurs when a company creates a direct private network that links among themselves or creates private, secure Internet access, in effect a private tunnel within the Internet.
virtual
What is it called when a company creates a direct private network that links among themselves or creates private, secure Internet access, in effect a private tunnel within the Internet?
virtual private network
What is another name for telecommuting?
virtual workforce
What creates a virtual version of computing resources, such as an operating system, a server, a storage device, or network resources?
virtualized system
Data __________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.
visualization
Data ___________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective.
visualization
_________ over LTE allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.
voice
A ____________ is a system weakness, such as a password that is never changed or a system left on while an employee goes to lunch, that can be exploited by a threat.
vulnerability
What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?
war chalking
A data ________ is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.
warehouse
A(n) __________ site is a separate facility with computer equipment that requires installation and configuration.
warm
a separate facility with computer equipment that requires installation and configuration
warm site
What means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web?
web accessibility
Where on a disaster recovery cost curve is the optimal place to operate in terms of cost and time?
where the curve between time from disaster to recovery and cost intersect
A(n) _______ area network spans a large geographic area such as a state, province, or country.
wide
A(n) ___________-WAN is a wide area network that uses radio signals to transmit and receive data.
wireless
Mobile business is the ability to purchase goods and services through a ________ Internet-enabled device.
wireless
What is a metropolitan area network that uses radio signals to transmit and receive data?
wireless MAN (WMAN)
What enables devices to connect to a wireless network to communicate with each other?
wireless access point
What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?
wireless fidelity
Proof-of-_________ is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain.
work