Exam 2: DS 3841

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

At what percent of capacity do most servers operate?

15-20%

Hardware and software acquisition costs account for about ________ percent of TCO.

20

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.

5,4,2,3,1

Which of the following resulted in an outage for Netflix customers on Christmas Eve 2012?

A failure of Amazon's cloud computing service

Today's nanotechnology-produced computer transistors are roughly equivalent in size to:

A virus

Which of the following enables a DBMS to reduce data redundancy and inconsistency?

Ability to minimize isolated files with repeated data

________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability

Which of the following is not an example of the consumerization of IT?

Amazon Web Services

Which of the following is not an example of the potential dark side of big data?

Analyzing data from sensors installed in local parks to monitor soil moisture.

Which of the following is the most popular mobile operating system?

Android

Which of the following were involved in what has been called the patent trial of the century?

Apple and Samsung

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?

Application server software

All of the following are steps in the process for analyzing an ethical issue except:

Assigning responsibility

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.

Blade servers

Which of the following enables you to create a script that allows a web server to communicate with a back-end database?

CGI

Which of the following is not an example of the mobile digital platform?

CRM

All of the following laws apply to actions by the federal government except the

Children's Online Privacy Protection Act.

Which of the following is a leading networking hardware provider?

Cisco

In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules?

Classifications

You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use the data mining software you are using to do which of the following?

Classify data

Which of the following is not a U.S. federal law affecting private institutions?

Computer Matching and Privacy Protection Act

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

Microsoft SQL Server is a(n):

DBMS for midrange computers.

Which of the following occurs when the same attribute in related data files has different values?

Data Inconsistency

In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources?

Data administration

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?

Data inconsistency

Which of the following is a specialized language that programmers use to add and change data in the database?

Data manipulation language

Which of the following is the most common reason that business systems fail?

Data quality

________ creates confusion that hampers the creation of information systems that integrate data from different sources.

Data redundancy

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

Data scrubbing

In a large organization, which of the following functions would be responsible for physical database design and maintenance?

Database administration

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?

Digital Millennium Copyright Act

Which of the following terms refers to significant disparities in access to computers and the Internet among different social groups and different locations?

Digital divide

________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers?

Ethernet

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

Which of the following statements about Flash cookies is not true?

Flash cookies are installed only at the user's request.

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

Forecasting

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the following technologies would you use to analyze the social media data collected by a major online retailer?

Hadoop

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation?

His action is acceptable, because the higher social value is the survival of the family.

How would you determine the market demand for your firm's IT services?

Hold focus groups to assess your services

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?

Identify Sequences

Which of the following best describes Immanuel Kant's categorical imperative?

If an action is not right for everyone to take, it is not right for anyone to take.

Which of the following is not one of the current key technology trends that raises ethical issues?

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

Which of the following is a primary drawback to the "do anything anywhere" computing environment?

It blurs the traditional boundaries between work and family time.

Which of the following best describes the effect that new information technology has on society?

It has a ripple effect, raising new ethical, social, and political issues.

Which of the following statements about Linux is not true?

It has garnered 20 percent of the server operating system market.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles?

Kant's Categorical Imperative

The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems?

Lack of flexibility

Which of the following is not protected by copyright law?

Machines

________ states that the value or power of a network grows exponentially as a function of the number of network members.

Metcalfe's Law

Which of the following is a DBMS for desktop computers?

Microsoft Access

A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.

Multicore processor

Which of the following is not one of the current software platform trends?

Multicore processors

________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard.

Multitouch

FIP principles are based on a belief in which of the following?

Mutuality of interest between the record holder and the individual

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources?

NORA

________ uses individual atoms and molecules to create computer chips and other devices.

Nanotechnology

What percent of global Internet users use Google Search and other Google services?

Nearly 80 percent

MongoDB and SimpleDB are both examples of:

NoSQL databases

Which of the following tools enables users to view the same data in different ways using multiple dimensions?

OLAP

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-Demand

The NAI is an industry association formed to help with which of the following?

Online privacy issues

TRUSTe is an example of which of the following?

Online seal program

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open Source

Software that manages the resources of the computer is called:

Operating system software

Which of the following is not an IT infrastructure service component?

Operating system software

Which of the following is not a file-sharing service?

Pandora

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years.

Patent law

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

Property rights and obligations

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age?

Quality of life

Which of the five moral dimensions of the information age does spamming involve?

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under low-impact loads?

RSI

________ are not held liable for the messages they transmit.

Regulated common carriers

________ means that you accept the potential costs and obligations for the decisions you make

Responsibility

A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n):

SLA

Which of the following refers to a set of self-contained services that communicate with each other to create a working software application?

SOA

Which of the following is the most prominent data manipulation language today?

SQL

A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data?

Sentiment analysis software

In data mining, which of the following involves events linked over time?

Sequences

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope rule

Which of the following is not an example of a wearable computing device?

Smartphones

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

Software packages

Which of the following statements about spam is not true?

Spamming is more tightly regulated in Europe than in the United States.

Which of the following is not a method for performing a data quality audit?

Surveying data definition and query files

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

Technology standards

Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers?

Telecommunications

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships.

Text mining

Which of the following restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information?

The Privacy Act

Which of the following best illustrates the relationship between entities and attributes?

The entity CUSTOMER with the attribute PURCHASE

Which of the following is not true about the changes to EU data protection rules proposed in 2012?

The new rules would reject the right to be forgotten.

________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.

The opt-in model

Which of the following is not a difficulty in establishing patent protection?

The requirement that the work must be a secret

In a multi-tiered network:

The work of the entire network is balanced over several levels of servers.

Which of the following best describes how new information systems can result in legal gray areas?

They result in new situations that are not covered by old laws.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership

Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement?

Trade secret

Which of the following is an example of a legacy system?

Transaction processing system running on a mainframe

All of the following are current hardware platform trends except:

Unix

Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms?

Unix

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?

Virtualization

Which of the following is a recent addition to the mobile digital platform?

Wearable computing devices

________ are created by combining and customizing components from different online software applications.

Web mashups

Which of the following would you use to find patterns in user interaction data recorded by a web server?

Web usage mining

Which of the following factors does not help explain why computing resources today are even more available than in previous decades?

Widespread rejection of technology standards

Which of the following became the standard PC in the Personal Computer Era?

Wintel PC

Which of the following is the foundation technology for web services?

XML

________ provides a standard format for data exchange, enabling web services to pass data from one process to another.

XML

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?

Your firm's organizational culture

Running a Java program on a computer requires:

a Java Virtual Machine to be installed on the computer.

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with:

a crow's foot topped by a short mark

ZipRealty, which combines Google Maps with real estate data, is an example of:

a mashup

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

airport code

The introduction of the minicomputer

allowed computers to be customized to the specific needs of departments or business units.

Linux is:

an example of open-source software

A(n) ________ is used to communicate between a user and an organization's back-end systems.

application server

A characteristic or quality that describes a particular database entity is called a(n):

attribute

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history.

behavioral targeting

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:

browser

All of the following are technologies used to analyze and manage big data except:

cloud computing

The join operation:

combines relational tables to provide the user with more information than is otherwise available.

Interpretations of Moore's law assert that:

computing power doubles every 18 months

The select operation:

creates a subset consisting of all records in the file that meet stated criteria.

The project operation:

creates a subset consisting of columns in a table.

All of the following are technical solutions to protecting user privacy except:

data use policies

The term big data refers to all of the following except:

datasets with fewer than a billion records

DBMSs typically include report generating tools in order to:

display data in a easier-to-read format.

Digital media differs from a physical book in all of the following ways except:

ease of establishing uniqueness.

The Online Privacy Alliance:

encourages self-regulation to develop a set of privacy guidelines for its members.

Data cleansing not only corrects errors but also:

enforces consistency among different sets of data

The development of TCP/IP occurred during the ________ era.

enterprise computing

A schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram

CVS refers to:

eyestrain related to computer display screen use.

Data mining allows users to:

find hidden relationships in data

In 2010, the FTC added all of the following recommendations to its privacy guidelines except:

firms should limit the length of time that any personal data is stored to six months or less.

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

green computing

The marketplace for computer hardware:

has become increasingly concentrated in top firms.

A data warehouse is composed of:

historic and current internal data

Saas refers to:

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

The ethical "no free lunch" rule states that:

if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:

in two short marks

All of the following are issues with the traditional file environment except:

inability to develop specialized applications for functional areas.

Redesigning and automating business processes can be seen as a double-edged sword because:

increases in efficiency may be accompanied by job losses.

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):

information policy

A field identified in a record as holding the unique identifier for that record is called the:

key field

A ________ is an example of pre-digital data storage that is comparable to a database.

library card catalog

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization

In the context of data relationships, the term associations refers to:

occurrences linked to a single event

When a cookie is created during a website visit, it is stored:

on the hard drive of the visitor's computer.

In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

opt-out

The practice of contracting custom software development to an outside firm is commonly referred to as:

outsourcing

A DBMS makes the:

physical database available for different logical views.

The logical view of a database:

presents data as they would be perceived by end users.

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of:

quantum computing

Which of the following is not one of the NIST defined characteristics of cloud computing?

reduced elasticity

Data ________ occurs when the same data is duplicated in multiple files of a database

redundancy

A(n) ________ represent data as two-dimensional tables.

relational DBMS

The U.S. CAN-SPAM Act:

requires commercial email senders to identify themselves.

In a table for customers, the information about a single customer resides in a single:

row

The U.S. Department of Commerce developed a ________ framework in order to enable U.S. businesses to legally use personal data from EU countries.

safe harbor

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

scalability

In a relational database, the three basic operations used to develop useful sets of data are:

select, project, and join

Which of the following is not one of the techniques used in web mining?

server mining

A SAN is a ________ network.

storage area

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

"Look and feel" copyright infringement lawsuits are concerned with:

the distinction between an idea and its expression.

Microsoft Access's data dictionary displays all of the following information about a field except the:

the organization within the organization that is responsible for maintaining the data.

According to ________, you should take the action that produces the least harm.

the risk aversion principle

In a relational database, a record is referred to in technical terms as a(n):

tuple

A client computer networked to a server computer, with processing split between the two types of machines, is called a(n):

two-tiered client/server architecture

OLAP enables:

users to obtain online answers to ad-hoc questions in a rapid amount of time.

All of the following are cloud computing services except:

virtualization as a service

Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as:

web services

The FIP principle of Notice/Awareness states that:

websites must disclose their information practices before collecting data.


संबंधित स्टडी सेट्स

MN Intrapartum-Fetal Heart Rate/NCLEX Exam 2

View Set

Spanish 1 Practice of -ar Verb Conjugation

View Set

medialab recall -- questions you've missed

View Set