CISP Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor. a. antiglare filter b. screen protector c. privacy screen d. muting display

a. antiglare filter

Many businesses have a(n) _____ in place, which automatically backs up data files. a. backup system b. restore system c. automatic update system d. external storage system

a. backup system

A _____ might be used to connect the networks in two different buildings or departments of a company, both of which are set up using the same topology. a. bridge b. router c. repeater d. switch

a. bridge

A company with a hybrid cloud can meet demand spikes by using _____, in which the private cloud handles the average workload and public cloud resources come online automatically to handle extra activity. a. cloud bursting b. cloud management c. visualization d. cloud transitioning

a. cloud bursting

A _____ provides an author or artist the right to control use of his or her work and charge others for its use a. copyright b. trademark c. patent d. registration

a. copyright

A _____ is a collection of data organized in one or more tables stored on a computer a. database b. presentation c. spreadsheet d. document

a. database

Many music, video, and software distributors have focused on developing and implementing copy protection technologies called a. digital rights management (DRM). b. program copying prevention (PCP). c. new-age copyright management (NACM). d. Sony BMG.

a. digital rights management (DRM)

In a large, complex business or organization, information from different functional modules, such as human resources and manufacturing, can be pulled together using a(n) _____ system. a. enterprise resource planning (ERP) b. computer-integrated manufacturing (CIM) c. statistical quality control (SQC) d. customer relationship management (CRM)

a. enterprise resource planning (ERP)

In _____, the file system saves multiple previous versions of a file. a. file versioning b. conversations c. cloud storage d. business-level public clouds

a. file versioning

A _________ (or layout) is the pattern by which a network is organized a. network topology b. hybrid topology c. token ring topology d. mesh topology

a. network topology

Some criminals trick their victims into giving away private information by getting them to respond to emails that seem to come from legitimate sources. This type of cybercrime is called a. phishing. b. industrial espionage. c. cyberwar. d. rogue hotspotting.

a. phishing

A(n) _____ is a collection of related fields describing a single entity. a. record b. attachment c. transaction d. data type

a. record

A(n) _____ check involves making sure that the records entered into tables remain consistent with the relationships between the tables. a. referential integrity b. consistency c. range d. alphanumeric

a. referential integrity

A physical _____ topology is rarely used anymore, because if one computer or device is removed or one segment of cable has a break in it, the entire network will fail. a. ring b. bus c. star d. hybrid

a. ring

A retinal recognition system uses which of the following as identifiers? a. the unique patterns of blood vessels found on the backs of eyeballs b. the distances between facial features, such as the eyes c. the hundreds of details about irises d. the unique patterns of blinking

a. the unique patters on blood vessels found on the backs of eyeballs

What is the purpose of a patent? a. to award ownership of an idea or invention to its creator for a fixed number of years b. to provide an author or artist the right to control use of his or her work and charge others for its use c. to establish ownership of a certain identifying symbol or logo d. to acknowledge the original source of an idea

a. to award ownership of an idea or invention to its creator for a fixed number of years

A _____ establishes ownership of a certain identifying symbol or logo a. trademark b. registration c. copyright d. patent

a. trademark

Which of the following statements describes an extranet? a. It's a type of Internet architecture that works best for organizations with 10 to 12 computers. b. It's an extension of an intranet that allows specified external users to access certain resources in the organization's network. c. It's a form of Internet access that can be performed offline. d. It's a network that typically has a wired backbone plus some wireless access at end points for individual users.

b. It's an extension of an intranet that allows specified external users to access certain resources in the organization's network

Which of the following structures data in multiple dimensions? a. record object b. OLAP Cube c. legacy database d. flat file

b. OLAP Cube

In the _____ method, the user builds a query by selecting one or more tables to query, adding the fields to display in the query grid, and then entering the entry to match or other criteria in applicable fields. a. Access b. Query by Example (QBE) c. SELECT d. Structured Query Language (SQL)

b. Query by Example

For a database that stores students' grades, which of the following fields could be designated as a primary key? a. StudentName b. StudentID c. StudentGPA d. StudentAddress

b. StudentID

A voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, and a handwritten signature are all forms of a. access systems. b. biometric identifiers. c. measurement patterns. d. strong passwords.

b. biometric identifiers

A can of _____ comes with a detachable, thin, plastic tube that allows directing the airflow precisely when cleaning inside the computer case. a. conditioned air b. compressed air c. system air d. air cleaner

b. compressed air

Which of the following technologies is commonly used in Las Vegas casinos to track people who are known cheaters? a. signature verification system b. computerized facial recognition c. hand geometry system d. fingerprint scanner

b. computerized facial recognition

Suppose someone gained unauthorized access to a company's network with the intent of stealing sensitive information. That person would best be described as a a. slacker. b. cracker. c. white hat. d. hacker.

b. cracker

A password is considered strong if it's a. a common word, such as Password. b. easy to remember but hard to guess. c. easy to remember because it's obvious, such as a pet's name. d. hard to remember and easy to guess.

b. easy to remember but hard to guess

A(n) _____ is a private network within an organization that uses the same basic protocols as the Internet but is restricted to only the staff of that organization. a. personal area network (PAN) b. intranet c. metropolitan area network (MAN) d. Extranet

b. intranet

The _____, or delay, involved in satellite Internet access limits the performance of this service to levels far below those of cable and DSL. a. corrosion b. latency c. bridging d. multiplexing

b. latency

Each network adapter has a unique hardware identifier called a _____ address, which is a 12-digit number that consists of six two-digit pairs. a. Internet protocol (IP) b. media access control (MAC) c. gateway access (GA) d. network translation (NT

b. media access control (MAC)

The process of structuring a database to avoid duplication of entries and relationships between entries is called a. redundancy. b. normalization. c. contamination. d. validation.

b. normalization

A(n) _____ puts backup files online while allowing you to keep your primary files on your local computer. a. file restoring service b. online backup service c. offline backup service d. online updater service

b. online backup service

A _____ code provides a signal to the consumer that more information about a product or service is available online. a. fast information (FI) b. quick response (QR) c. speedy review (SR) d. rapid reply (RR)

b. quick response (QR)

Modern warehouse systems use which of the following technologies to enhance inventory tracking and placement? a. office information system (OIS) b. radio frequency identification (RFID) c. vendor identification (VID) d. standard operating procedure (SOP)

b. radio frequency identification (RFID)

Common computer ailments, such as tendonitis and carpal tunnel syndrome, are types of a. ergonomic distress. b. repetitive stress injuries. c. arthritis. d. repetitive distress syndromes

b. repetitive stress injuries

A _____ physically connects the computers in a local area network (LAN) and is able to read the data in each incoming data packet, determine its destination, and then forward it to the correct computer. a. token b. server c. switch d. blade

b. server

A(n) _____ collects product information from multiple online merchants, enabling consumers to compare prices. a. online shopping mall b. shopping agent c. online catalog d. e-tailer

b. shopping agent

In a _____ topology, a computer is allowed to send data to the network only if it has permission to speak. a. star b. token ring c. ring d. hybrid

b. token ring

A _____ contains everything a business needs to get a new information system up and running. a. systems integrator b. turnkey system c. smart system d. niche information system

b. turnkey system

A computer _____ is a program that's designed to perform some kind of trick on an unsuspecting victim; the trick can be mild or much more severe. a. phish b. virus c. bus d. spoof

b. virus

Unlike a virus, which adds to itself to another program and waits for the user to execute an attachment or open a file with a macro, a _____ actively attempts to move and copy itself. a. bug b. worm c. spoof d. phish

b. worm

What are the benefits of having a scalable server? a. Having a scalable server allows better enforcement of specific security standards and thus reduces security-related costs. b. With a scalable server, new services can be delivered and upgraded more quickly than would be possible if an internal server infrastructure had to be built from scratch. c. A scalable server can be made larger or smaller and moved around easily, so there's no need for physical hardware changes and no disruption to the app or service being delivered. d. Using a scalable server, a meeting presenter can share his or her desktop during an onscreen demonstration and even share keyboard control to allow participants to edit live documents.

c. A scalable server can be made larger or smaller and moved around easily, so there's no need for physical hardware changes and no disruption to the app or service being delivered

On a Mac, you can check a disk by running _____, which is in the Applications/Utilities folder a. Disk Check b. Disk Panel c. Disk Utility d. Disk Manager

c. Disk Utility

Which of the following is a popular query language that users can use to request information from a database? a. Database Query Language (DBL) b. Database Field Query Language (DFQL) c. Structured Query Language (SQL) d. SELECT Query Language (SQL)

c. Structured Query Language (SQL)

On a Windows computer, open the _____ to access an unresponsive application and shut it down manually. a. Force Quit dialog box b. System Update Manager c. Task Manager d. Task Start

c. Task Manager

What is cloud storage? a. a saved list of songs that you can select and replay at a later time b. a set of programs for backing up your computer's contents c. a service that provides you with a set amount of file storage space in the cloud d. a free app for your tablet or smartphone that makes reading email easier

c. a service that provides you with a set amount of file storage space in the cloud

The overall throughput per second of a transmission medium is its a. wirewidth. b. medium. c. bandwidth. d. speed.

c. bandwidth

Headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain are all symptoms of a. ergonomic failure. b. visual disability. c. computer vision syndrome. d. repetitive vision stress.

c. computer vision syndrome

A(n) _____ stores data gathered from one or more databases, functioning as a vast storage place for information that can later be used in a variety of ways. a. distributed database b. operational database c. data warehouse d. data mine

c. data warehouse

Private, public, and hybrid are the three main cloud _____ models a. virtualization b. provisioning c. deployment d. computing

c. deployment

The gap between people who do and don't have access to computers and the Internet is called the a. cyber chasm. b. poverty line. c. digital divide. d. regional cutoff.

c. digital divide

A(n) _____ database is a traditional data file storage system that contains only one data table or file a. multimedia b. object-oriented c. flat file d. relational

c. flat file

A private network that serves the needs of a business, organization, school, or residence with computers located in a single building or group of nearby buildings is called a a. local private network (LPN). b. virtual area network (VAN). c. local area network (LAN). d. virtual private network (VPN).

c. local area network (LAN)

A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. a. distributed b. warehouse c. operational d. hybrid

c. operational

A cloud setup created for and used by a single organization is a(n) _____ cloud. a. Internet b. hybrid c. private d. public

c. private

Most modern databases use a(n) _____ database model, in which fields with similar data can be connected between tables or files in the database. a. hybrid b. object-oriented c. relational d. flat file

c. relational

Deciding to play computer games all night, instead of sleeping enough to perform well at work or school, is an example of the unwise choices made by someone with a(n) a. digital obsession. b. technology focus. c. technology addiction. d. Internet addiction.

c. technology addiction

A niche information system is also referred to as a _____ market system a. linear b. horizontal c. vertical d. mobile

c. vertical

By using _____, businesses can combine Microsoft Office suite applications or web apps with a SharePoint-based space in Microsoft's public cloud. a. SharePoint b. Exchange Online c. Exchange d. Office 365

d. Office 365

What is a virtual server? a. a type of server that delivers content and services for a subscription fee b. a server that uploads backed-up data to the cloud c. a server accessed via a secure Internet connection from the home, office, or anywhere else d. a server created by software rather than separate hardware

d. a server created by software rather than separate hardware

The information that's yielded through the effective use of online analytical processing (OLAP) systems is called a. expert system (ES) information. b. executive information (EI). c. data modeling (DM). d. business intelligence (BI).

d. business intelligence

From the end user's standpoint, _____ means using a free or subscription service that's delivered over the Internet. a. networking b. data processing c. multitasking d. cloud computing

d. cloud computing

A _____ system provides a company with a structured way to track interactions with current and potential customers. a. statistical quality control (SQC) b. tracking relationship management (TRM) c. computer-integrated manufacturing (CIM) d. customer relationship management (CRM)

d. customer relationship management (CRM)

Because databases generally form the core of a company's information systems, _____, which involves operating and maintaining the database system, is an important IT function. a. database editing b. database monitoring c. database operations d. database administration

d. database administration

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? a. operational database b. networked database c. hybrid database d. distributed database

d. distributed database

One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. a. automatic data interchange (ADI) b. virtual private networks (VPNs) c. supply chain management (SCM) d. electronic data interchange (EDI)

d. electronic data interchange (EDI)

With a _____ sale, an online retailer sells a small amount or surplus of merchandise at a large discount for a limited period of time. a. flexible b. quick c. virtual d. flash

d. flash

Whereas microwave technology transmits data as radio waves, _____ technology transmits data as light waves. a. Bluetooth b. Wi-Fi c. transponder d. infrared

d. infrared

A(n) _____, which records every typed keystroke on a victim's hard drive, is a common type of espionage virus a. unsecured keyboard b. key corrupter c. system backdoor d. keystroke logger

d. keystroke logger

At the most basic level, a _____ consists of two or more computers, devices, and software connected by one or more communications media, such as wires, telephone lines, and wireless signals. a. bandwidth b. multiplex c. transmission d. network

d. network

A _____ is a network adapter that's added to the computer as an expansion device. a. media access control (MAC) address b. gateway c. repeater d. network interface card (NIC)

d. network interface card (NIC)

A _____ transmission sends only one bit of data at a time; it's like a narrow path that only one person can use at a time. a. parallel b. simplex c. full-duplex d. serial

d. serial

Cloud storage is a service that provides the user with a(n) _____ amount of file storage space in the cloud. a. unlimited b. movable c. shared d. set

d. set

A _____ card is a plastic card, similar to a credit card, that contains stored information in a computer chip inside it. a. badge b. key c. memory d. smart

d. smart

A business activity that's central to the nature of an enterprise, such as selling a product, is a(n) a. electronic exchange. b. connection. c. information system. d. transaction.

d. transaction


संबंधित स्टडी सेट्स

Purines and pyrimidines.........

View Set

Which of the following defines business ethics? An approach toward decision making in which a person evaluates moral principles Professional standards of conduct, based on moral principles and values, guiding decision-making and actions Choices made ba

View Set