IMS Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is spyware that logs and transmits everything a user types.

A keylogger

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A. wireless router B. wireless sensor C. hot spot D. access point

Access Point

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

Airport Code

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?

Application Server

What are the four layers of the TCP/IP (transmission control protocol/internet protocol) reference model? A) Physical, application, transport, and network interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet

Application, Transport, Internet, and Network Interface

All of the following are physical components of an RFID (radio frequency id) system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.

Bar Codes

All of the following are currently being used as traits that can be profiled by biometric authentication except retinal images. facial characteristics. voice. fingerprints. body odor.

Body Odor

Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL

C) SQL

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) Cost per lead B) Cost per sale C) Churn rate D) CLTV

CLTV

The join operation A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view. D) is used to combine indexing operations

Causes two tables with a common domain to be combined into a single table or view

The total time it takes to complete a business process, from start to finish, is called its ________ time. fulfillment service cycle actualization development

Cycle

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. phishing botnet SQL injection DoS DDoS

DDos

What service converts natural language names to IP addresses?

DNS (Domain Name Systems)

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data table

Data Dictionary

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name

Data inconsistency

In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management

Database administration

Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP

HTTP

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast

Identity Sequences

When hackers gain access to a database containing your personal private information, this is an example of

Identity Theft

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement

Managing the Supply Change

Which of the following is a DBMS (database management system)for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange

Microsoft Access

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.

Network Service Products

A field identified in a table as holding the unique identifier of the table's records is called the

Primary Key

Which type of application does Macy's use to track items for sale on store shelves?

RFID (radio frequency id)

Which of the following pulls content from websites and feeds it automatically to users' computers? A) FTP (file transfer protocol) B) RSS (rich site summary) C) HTTP (Hypertext transfer protocol) D) Bluetooth E) IPv6

RSS (Rich Site Summary)

A(n) ________ represent data as two-dimensional tables.

Relational DBMS

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

Safety stock

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

Spear Phishing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called

Supply Chain

On which of the following protocols is the Internet based? A) TCP/IP (transmission control protocol/Internet protocol) B) FTP (File Transfer Protocol) C) IMAP (Internet Message Access Protocol) D) HTTP (hypertext transfer protocol) E) DNS (domain Name system)

TCP/IPB

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:

The internet of things

Which process is used to protect transmitted data in a VPN (virtual private network)? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining

Tunneling

Which of the following statements about Internet security is not true. A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.

VoIP is more secure than the switched voice network.

Two-factor authentication utilizes a(n): a digital certificate. a firewall. unique password. a multistep process of authentication. encrypted connection.

a multistep process of authentication.

A characteristic or quality that describes a particular database entity is called a(n): A) field. B) tuple. C) key field. D) attribute. E) relationship.

attribute

A database ________ describes a database entity.

attribute

Enterprise software is built around thousands of predefined business processes that reflect industry goals. cutting edge workflow analyses. the firm's culture. the firm's organization. best practices.

best practices

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.

bull whip

IPv6 has been developed in order to

create more IP addresses

A foreign country attempting to access government networks in order to disable a national power grid would be an example of denial-of-service attacks. cyberwarfare. cyberterrorism. evil twins. phishing.

cyberwarfare

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing.

A(n) ________signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0- bits.

digital

Which of the following focuses primarily on the technical issues of keeping systems up and running

disaster recovery planning

Client/server computing is a:

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

Distribution and delivery of products to retailers is part of the

downstream portion of the supply chain

Data cleansing not only corrects errors but also: A) establishes logical relationships between data. B) structures data. C) normalizes data. D) removes duplicate data. E) enforces consistency among different sets of data.

enforces consistency among different sets of data.

A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.

entity-relationship diagram.

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots.

hotspots

The business value of an effective supply chain management system includes all of the following except:

improved delivery service

Uncertainties in the supply chain often lead to:

increases in inventory across all tiers

A distributed database

is a database that is stored in multiple physical locations

A VPN

is an encrypted private network configured within a public network

A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.

key field

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.

normalization.

Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box.

predicts what you are looking for as you enter words into the query box.

The logical view of a database: A) displays the organization and structure of data on the physical storage media. B) includes a digital dashboard. C) allows the creation of supplementary reports. D) enables users to manipulate the logical structure of the database. E) presents data as they would be perceived by end users.

presents data as they would be perceived by end users.

A supply chain driven by forecasts of consumer demand follows a(n) ________ model.

pull based

Walmart's continuous replenishment system is an example of a(n) ________ model pull-based forecast-based enterprise-based push-based supply chain optimization

pull based

Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy

redundancy

Fault tolerant information systems offer 100 percent availability because they use:

redundant hardware, software, and power supplies

In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.

row

In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select.

select, project, and join.

Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying definition and query files D) surveying end users about their perceptions of data quality

surveying data definition and query files

All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets. D) the inability to fully test programs. E) the increase in malicious intruders seeking system access.

the increase in malicious intruders seeking system access.

Microsoft Access's data dictionary displays all of the following information about a field except the: A) size of the field. B) format of the field. C) description of the field. D) type of the field. E) the organization within the organization that is responsible for maintaining the data.

the organization within the organization that is responsible for maintaining the data.

The domain .gov is a(n):

top-level domain

In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.

tuple.

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two factor authentication

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.

uniform resource locator.

Which of the following is the single greatest cause of network security breaches?

user lack of knowledge

OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports.

users to obtain online answers to ad-hoc questions in a rapid amount of time.

Blockchain refers to a technology that

uses a distributed ledger system of transaction

WPA2 is a more effective way to secure a wireless network than WEP because it

uses much longer encryption keys.

A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network.

wide area network


संबंधित स्टडी सेट्स

Satire in The Pardoner's Tale unit 2 lesson 9

View Set

Art History 2001 Exam #2 Questions and Vocabulary- The Ohio State Univeristy

View Set

African Elephants (Oral Presentation)

View Set

7.1 Utilitarianism Too Demanding?

View Set

Chapter 11 Poisoning & Substance Abuse

View Set