INFM-220 - Chapters: 4, 5, & 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is incorrect about the difference between a spreadsheet and a database? List three differences between them. A. A database and a spreadsheet do not have any differences, just the vendor who developed the software. B. A database has defined field types, a spreadsheet does not. C. A database uses a standardized query language (such as SQL), a spreadsheet does not. D. A database can hold much larger amounts of data than a spreadsheet.

A. A database and a spreadsheet do not have any differences, just the vendor who developed the software.

What does the term packet mean? A. A packet, also called Ethernet packet, is the fundamental unit of information transmitted by the internet. B. A pack is the way to move extremely large files using physical hard drives, but a packet is a way to move small files. C. Packet is a business term referring to information moving through a business process. D. None of the above define the term packet with respect to the internet.

A. A packet, also called Ethernet packet, is the fundamental unit of information transmitted by the internet.

Which statement is not true about a relational database? A. A relational database is one in which data is organized into one or more spreadsheets. B. Each table has a set of fields, which define the nature of the data stored in the table. C. A record is one instance of a set of fields in a table. D. All the tables are related by one or more fields in common.

A. A relational database is one in which data is organized into one or more spreadsheets.

What is role-based access control? A. A user has at least one role in the company. The access for that user is based on access given to that role. B. As in acting, a user plays a role in a company, which puts the user at different positions in the company. C. Access control to a job can be role-based or preference based as seen in nepotism within a company. D. None of these define what role-based access control.

A. A user has at least one role in the company. The access for that user is based on access given to that role.

How does the data component relate to the hardware and software components of information systems? A. Hardware stores the data. Software processes the data. B. Software stores the data. Hardware processes the data. C. Hardware and software participate equally with data. D. Data is more important than hardware and software.

A. Hardware stores the data. Software processes the data.

What is Metcalfe's Law? A. Metcalfe's Law states that the number of transistors in a computer doubles every two years. B. Metcalfe's Law states that a person is limited to 150 stable relationships at any one time. C. Metcalfe's Law states that a person can keep 7, plus or minus two things in their head at any given time. D. Metcalfe's Law states that the value of a network is related to the square of the number of connections in the network.

D. Metcalfe's Law states that the value of a network is related to the square of the number of connections in the network.

What university was not one of the first four locations hooked up to the Internet, then called ARPANET? A. UCLA B. Stanford C. MIT D. Yale

D. Yale

What is data mining? A. Data mining is the virtual version of physically mining ore, such as gold or iron. B. Data mining is looking for patterns in data like trends, associations and groupings. C. Data mining is the same as business intelligence. D. Data mining results in the creation of cryptocurrencies like Bitcoin.

B. Data mining is looking for patterns in data like trends, associations and groupings.

What is pretexting? A. Sending a text message to a friend before they send a text message to you B. Faking someone else's identity when interacting with IT C. Encrypting the text ahead of time to protect the message D. Sending a virus into the system through the use of a text file.

B. Faking someone else's identity when interacting with IT

What is metadata? A. Metadata consists of the actual data values in the fields of the records stored. B. Metadata is data about data that characterizes that data. C. Metadata means millions of data points, where Gigadata is billions of data points. D. None of these are true about metadata.

B. Metadata is data about data that characterizes that data.

What is a computer firewall? A. A concrete or brick wall between condos to prevent fire from leaping across B. Software or hardware that filters all packets as they come into the organization using a set of rules. C. Hardware that encrypts and decrypts data packets as they move through an organization D. The insurance policy used by businesses to for computer losses due to fire or other disasters.

B. Software or hardware that filters all packets as they come into the organization using a set of rules.

What does the term authentication mean? A. That the person has a login and a password that works. B. That the person is who they say they are. C. That the person is authorized to in the system. D. That the person has a security clearance.

B. That the person is who they say they are.

Some of quantitative fields used by OAKS would include all but which one? A. The number of times a student has logged into an OAKS course. B. The name of the student logging into an OAKS course. C. The average score on Quiz 1 of a course in OAKS. D. The number of graded items in a course in OAKS.

B. The name of the student logging into an OAKS course.

What does the term VoIP mean? A. Voting In Progress B. Voice over Internet Protocol C. Voice over TCP D. It is the sound that the bird called a Vo makes at night.

B. Voice over Internet Protocol

When would using a personal DBMS make sense? A. When you want to keep personal data of customers in the database management system. B. When the amount of data is small and the database will not be shared with others. C. When the database management system is a strategic and shared asset of the business. D. None of the above make sense.

B. When the amount of data is small and the database will not be shared with others.

Describe what the term normalization means. A. Encourages data duplication thus makes records easier to update. B. Organizing data that is normally distributed. C. Eliminates data duplication thus makes records easier to update. D. Watching out for outliers in the data.

C. Eliminates data duplication thus makes records easier to update.

Which one of the following is not an advantage of using a data warehouse. A. Data warehouses are expensive to buy and difficult to deploy in an organization. B. Data warehouses consolidate data collected over time by the organization into one version of the truth for post processing. C. Data warehouses combines periodic copies of the data from all enterprise systems for analyses. D. Data warehouses make it possible to do longitudinal analysis over time.

A. Data warehouses are expensive to buy and difficult to deploy in an organization.

What was the so-called killer app for the Internet? A. email B. spreadsheets C. databases D. Facebook

A. email

What is the difference between data, information, and knowledge? A. Data is made up of information plus knowledge B. Information comes from knowledge to make decisions about data C. Information is data in context and knowledge is information in context D. Data, information, and knowledge are the same thing.

C. Information is data in context and knowledge is information in context

What is the difference between quantitative data and qualitative data? A. Quantitative data is descriptive, not numeric, like a value from a sensor or transaction. Qualitative data is numeric, like a category or a label. B. Quantitative data is a subset of qualitative data. C. Quantitative data is numeric like a value from a sensor or transaction. Qualitative data is descriptive like a category or a label. D. There is no difference between quantitative data and qualitative data.

C. Quantitative data is numeric like a value from a sensor or transaction. Qualitative data is descriptive like a category or a label.

Which came first, the Internet or the World Wide Web? A. The WWW came before the internet or the internet would not have been international. B. First came Web 2.0 then Web 1.0 then the Internet. C. The internet had to come first because the WWW is built on top of the internet. D. The WWW and the internet came at the same time because they are different names for the same thing.

C. The internet had to come first because the WWW is built on top of the internet.

What is the purpose of encryption? A. To scramble all of the information on the internet so increase the privacy of information. B. To make things harder to find on the internet, as in the dark web or the deep web. C. To increase the confidentiality of data by scrambling the data so that it can only be unscrambled by those who have the right key D. To decrease the availability of data

C. To increase the confidentiality of data by scrambling the data so that it can only be unscrambled by those who have the right key

All are good ways to create a complex password except which one? A. Eight or more characters including at least one upper case, one lower case, one number and one special character B. Using a phrase instead of a word, as in golf-think-law-deploy C. Using the name of your first pet D. Using an autogenerated complex password

C. Using the name of your first pet

What makes a connection a broadband connection? A. The connection has many sub-connections called bands. B. When the music appeals to a broad audience. C. When the throughput of the connection is large. D. When it costs a lot.

C. When the throughput of the connection is large.

What is multi-factor authentication? A. This is when factors are used, as in multiplication to solve a problem. B. When two or more independent authorizations are done in a sequence. C. When two or more independent authentications are done in a sequence. D. When authentication is done with at least a login and a password.

C. When two or more independent authentications are done in a sequence.

What is an LAN? A. A network of computers across a metropolitan area B. A city area network, connecting computers across a metropolitan area C. A wide area network, connecting buildings of computers together, like a campus D. A local area network, connecting computers in a room or across a building

D. A local area network, connecting computers in a room or across a building

What does the term physical security mean? A. Locks on doors B. Guards at gates C. Video camera surveillance D. All of the above

D. All of the above

Why is it important to define the data type of a field when designing a relational database? A. The amount of storage space can be determined by knowing the data type of each field. B. The type of processing allowed can be determined by knowing the data type of each field. C. The data going into that field can be validated to prevent bad data from entering that field. D. All of the above are reasons why fields have data types.

D. All of the above are reasons why fields have data types.

What was revolutionary about Web 2.0? A. The Web moved from being static to being dynamic. B. The Web became writable, not just readable. C. Huge numbers of people became authors. D. All of the above characterize Web 2.0.

D. All of the above characterize Web 2.0.

What are the components of a good backup plan? A. Backing up regularly and not randomly B. Storing the backup off-site in case of physical destruction C. Practice restoring the backup to make sure it works D. Deciding what needs to be backed up, making regular backups, using offsite storage of all backed-up data, and a testing the restoration process

D. Deciding what needs to be backed up, making regular backups, using offsite storage of all backed-up data, and a testing the restoration process

What are the three members of the information security triad? A. Authentication, Authorization, Confidentiality B. Availability, Confidentiality, and Privacy C. Confidentiality, Integrity and Ethics D. Integrity, Confidentiality and Availability

D. Integrity, Confidentiality and Availability


संबंधित स्टडी सेट्स

Mathematics 700 Fundamentals - Unit 9: Measurement and Area CIRCUMFERENCE

View Set

neuro practice questions (ch 14)

View Set

CCNA LAN Switching and Wireless Chapter 9

View Set

Krueger, Explorations in Economics 1e, Module 13

View Set

Chapter 8 Risk & Rates of Return

View Set

respiratory exam practice questions

View Set

NURS 212 -- Chapter 14 PrepU Review

View Set

Foundational Skills (Yellow Belt)

View Set