isds final
The field that has a unique entry for each record in a database table is called the master field. foreign key. primary key. logical key.
primary key
a system that is designed to help keep track of everyday business activities is an management information system transaction processing system enterprise resource planning system decision support system
transaction processing system
The protocol used to send e-mail over the Internet is (1 point) SMTP. DNS. DHTML. HTTP.
SMTP
the protocol to send email over the internet is
SMTP
Encryption is used to? a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the Internet more available
A.
IPv6 uses 32 bits to assign? a. data packet to each transmission b. a memory address to the CPU c. an address to every device connected to the Internet d. a destination Internet address to each e-mail
C
The information in a data packet includes? a. the data and the destination b. the data and circuit identifier c. the "To" address, "From" address, data, and reassembly instructions d. different types of information depending on the type of message being sent
C. "to" address, "from" address, data, and reassembly instructions
The collection of large national and international network providers used to establish the internet is called the? a. T1 b. highway system c. OC d. Internet backbone
D Internet Backbone
A small slice of a data warehouse is called a data mine. True False
False
Julian owns a large garment store that attracts hundreds of customers every week. His manager requests him to purchase a database system to track store inventory, sales, and customers. However, Julian wishes to traditionally maintain separate lists for stock, sales, and prospective customers and updates them manually every month. Which of the following is true with regard to this scenario? Julian would incur heavier expenses in maintaining a list than setting up and administering a database. Julian's entries might be subject to data redundancy. There is no possibility of Julian's data being inconsistent. If Julian changes any entry in a list, it would be automatically changed in all the lists.
Julian's entries might be subject to data redundancy
network adapters send data packets based on
MAC address
The main suite of Internet protocols used to transmit data is called (1 point) DNS. HTTP. XML. TCP/IP.
TCP/IP
a network consisting of two LANS separated by great physical distances is known as
WAN
Which of the following best refers to a group of related records in a database? Metadata Schema A table A field
a table
Which of the following is true of a database? A centralized database is a shared source of information that everyone can access. It lacks features such as accuracy and reliability of data. It requires database administrators to create simple and small databases. It is created and managed using an accounts management system.
a centralized database is a shared source of information that everyone can access
Which best describes a data warehouse? a database that organizes data from multiple organizations a collection of all the data from an organization's databases a building that stores computer servers a software program that assists with file management
a collection of all the data from an organizations databases
Which of the following statements is a characteristic of enterprise resource planning (ERP) systems? ANSWER Manual integration of various processes within the organization is required. A common database to store and integrate information is used. Data gathered from the individual business units are kept confidential. Usage of information is restricted to a single area of an enterprise.
a common database to store and integrate information is used
In data centralization, __________. access is granted to the owner of the centralized database solely security of data is diminished greatly a single file is maintained to ensure reliability and accuracy of data the efficiency is decreased as there are files to reconcile with each other
a single file is maintained to ensure reliability and accuracy of data
IPv6 uses 32 bits to assign a(n) (1 point) estination Internet address to each e-mail. address to every device connected to the Internet. memory address to the CPU. data packet to each transmission.
address to every device connected to the internet
In the client-server model, clients are phones or computers and servers are (1 point) computers hosting web pages. computers with software allowing you to make purchases. computers that are storehouses for files. all of the above
all of the above
The rise of the Internet of Things has meant (1 point) light bulbs can join your WiFi network at home. there are more machines with wireless network adapters. we need longer IP addresses than are available in IPv4. all of the above
all of the above
Which is a report generated by a management information system? exception report summary report detail report all of the above
all of the above
in client server models, clients are phones or computers and servers are computers? a. computers hosting web pages b. computers with software allowing you to make purchases c. computers that are storehouses for files d. all of the above
all of the above
Which of the following is true of records? All records in a table have the same fields but usually different data. Each column in a database is represented as a record. An entire record functions as the primary key in a database. A record is a database object in the form of rows and columns in which data is stored.
all records in a table have the same fields but usually different data
Angels is a kids-wear manufacturing company in Boston. The company wants to use software to integrate the information flowing from the production, supply chain management, and the project management departments to enable better coordination between these departments and improve the production rate. Which of the following business intelligence systems can best assist Angels in the given scenario? an enterprise resource planning system a clickstream data system a natural language processing system a batch processing system
an enterprise resource planning system
Correctly entering the user ID and password on your college network is an example of (1 point) scalability. authentication. virtualization. packet screening.
authentication
To ensure only authorized users are logging onto a network, which server would a client/server network include? (1 point) application communications authentication Internet
authentication
correctly entering the user ID and password on your college network is an example of
authentication
which of the following is used to increase security on a client/server network
bastion host
Packet switching sends information between two points (1 point) by breaking it into small chunks and sending the chunks across different routes. by finding one route between the two points and sending the data. differently for each company using it. by encrypting the data, then sending it.
by breaking it into small chunks and sending the chunks across different routes
data ______ maintains integrity
centralization
Data captured from websites as users navigate through a website is called? web-user data clickstream data time-variant data staged data
clickstream data
To manage authorized connections to external networks, which server would a client/server network include? (1 point) authentication communications application database
communications
to manage authorized connections to external networks which server would a client/server network include?
communications
Data integrity is best maintained in a database through __________. data staging data centralization data normalization data centers
data centralization
Two lists showing different values for the same data in different places of a database is an example of data irregularity. data inconsistency. data redundancy. data disparity.
data inconsistency
The process by which great amounts of data are analyzed and investigated is known as clustering. data staging. data mining. online analytical processing.
data mining
The Grey Tome library uses a large database to manage its collection of books. However, a large number of records are duplicates. This has increased the database size tremendously. Which database strategy should the library follow to overcome this redundancy? Data mining Data normalization Data centralization Data staging
data normalization
__________ reduces data redundancies in a database and ensures that the data is organized most efficiently. Data normalization Data staging Data mining Data centralization
data normalization
Paris is a librarian. She uses four different lists to maintain the library by categorizing books based on genres, authors, publishers, and price. She finds that many books in the genre list are repeated in the authors and the publishers lists. Which of the following terms best describes this duplication across lists? Data inconsistency Data redundancy Data warehousing Data staging
data redundancy
When importing data electronically from other files, __________. databases apply filters to the data to determine if it's in the correct format as defined by the data dictionary nonconforming data cannot be modified to fit the database's format the format of the database is insignificant to that of the data it is imperative to know that data cannot be imported from word processing documents
databases apply filters to the data to determine if its in the correct format as defined by the data dictionary
Which of the following is NOT a true statement when considering using databases instead of lists? Databases are easier to build and maintain than lists. Data can be easily shared among users. Data integrity can be ensured with a database. Data-entry errors can be minimized with databases.
databases are easier to build and maintain than lists
Which of the following is true of databases? Data contained in databases are seldom accurate or reliable. Use of databases invariably leads to data redundancy issues. Databases can be more time consuming and expensive to set up and administer than lists. Data stored in databases are prone to data inconsistency issues.
databases can be more time consuming and expensive to set up and administer than lists
which of the following is not an advantage of installing a network in a business enables peripheral sharing enables software sharing decentralization of files and data centralization of files and data
decentralization of files and data
A private key is important (1 point) because it enables you to use MIME. to reset your public key if you lose a password. to reboot system hardware. to decode an encrypted message.
decode an encrypted message
A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers. (1 point) CGI domain name DNS HTML
domain name
fiber optic cable would most likely be used in business networks when:
electrical or magnetic interference is present
Bridges are used to route data between two different networks. (1 point) True False
false
If you use an Internet cache, then the information displayed in your browser is automatically refreshed. (1 point) True False
false
Instant messaging is secure because of the type of encryption used. (1 point) True False
false
A database stores each category of information in columns known as __________. fields tables schema records
fields
A(n) __________ database is the simplest form of database consisting of a single list of items in a document or a spreadsheet. object-oriented relational multidimensional flat file
flat file
__________ are used to enter data into tables and make changes to existing data in the database. Data marts Input forms Foreign keys Join queries
input forms
A flat file database __________. is the most complex form of database stores data in objects is adept at handling binary large object (BLOB) type of data is a list or table in a document or a spreadsheet
is a list or table in a document or a spreadsheet
Which of the following best describes a database feature? It categorizes, filters, and sorts data within a table or between multiple tables. It controls the software and hardware that runs on a network. It manages system resources and only runs on GPS devices and video game consoles. It maintains a computer and protects it from viruses, worms, malware, and adware.
it categorizes, filters, and sorts data within a table or between multiple tables
HTTPS is different than HTTP because (1 point) it extracts data from source databases. it stores data in the data warehouse. it is a combination of HTTP and the Secure Sockets Layer (SSL). of how it transforms or reformats the data.
it is a combo of HTTP and the secure sockets layer (ssl)
Which of the following is the advantage of using a database? Large volumes of data can be stored in a single list or table in a database. Databases offer the advantage of data decentralization. It manages large amounts of data efficiently without compromising data accuracy. It is comparatively cheaper and easier to maintain than lists.
it manages large amounts of data efficiently without compromising data accuracy
Which SQL query is used to extract data that is in two or more tables? Join query Truncate query Insert query Create query
join query
Which of the following database systems uses artificial intelligence? enterprise resource planning system transaction-processing system office support system knowledge-based system
knowledge based system
Which of the following statements best distinguishes lists from databases? Unlike databases, lists incorporate data centralization techniques. Lists organize complex information, whereas databases handle relatively simpler information. Unlike databases, lists are always more expensive to create and maintain. Lists are prone to data inconsistencies, whereas databases promote data integrity.
lists are prone to data inconsistencies, whereas databases promote data integrity
JSON, Javascript Object notation is useful because it;
makes the document object modal usable in HTML
The type of database that uses fields, records, and measure as data attributes is relational. object-oriented. two-dimensional. multidimensional.
multidimensional
Siri, Cortana, and Google Now are examples of which type of knowledge-based system? expert system natural language processing system voice management system artificial intelligence
natural language processing system
A(n) __________ is the data type that is used to store pictures, charts, or files from another Windows-based application. ANSWER text object memo hyperlink
object
Which type of database would be best to handle unstructured data? object-oriented database relational database multidimensional database all of the above
object oriented database
NOS software is needed
on all computers in a client/server network
NOS software is needed (1 point) on all computers in a client/server network. only if a communications server is deployed on a client/server network. only when configuring a network in a star topology. only on the servers in a client/server network.
on all computers in a client/server network
Which type of relationship should be used to connect a Password table to a User Account table? one-to-one relationship one-to-none relationship many-to-many relationship one-to-many relationship
one to one relationship
Providing adequate security on a corporate network involves all of the following issues except
proprietary software lockout
Providing adequate security on a corporate network involves all of the following issues except (1 point) limiting physical access to networking equipment. authentication. proprietary software lockout. restricting access to servers.
proprietary software lockout
With respect to database software, a __________ contains information about a single entry in the database. ANSWER INCORRECT footnote header record cell
record
Which of the following statements is true of data normalization? It reduces the size of the database. It increases data redundancy by combining tables. It complicates the process of keeping records up to date. It decreases query speed.
reduces the size of the database
For each value in the foreign key table there is a corresponding value in the primary key table. Which of the following terms best describes this statement? Validation rule Data staging Referential integrity Normalization
referential integrity
In a database, a field __________. is a database object in which data is stored in rows and columns contains the information for a single entry in the database refers to a single piece of information in a record within a database represents each row in a database
refers to a single piece of information in a record within a database
Which is NOT a component of a database that describes how data is stored? report field record table
report
In SQL, a(n) __________ query displays a subset of data from one or more tables based on the criteria specified. insert select join delete
select
MIME is a protocol that's used when you're (1 point) executing a CGI script. sending a video file to YouTube. sending an e-mail that has a photo attached. encrypting an e-mail message.
sending an e-mail that has a photo attached
MIME is a protocol thats used when youre
sending an email that has a photo attached
Which type of network topology is most popular? (1 point) star Ethernet bus ring
star
which type of network topology is most popular?
star
HTML5 (1 point) is used to program server-side applications. supports powerful multimedia effects. provides high-level security for e-mail. is obsolete.
supports powerful multimedia effects
HTML5?
supports powerful multimedia effects
Which of the following best refers to a group of related records in a database? A table Schema A field Metadata
table
Which of the following is NOT considered metadata? the data type field name field size table name
table name
The following is a database of books in a library. From this database, which of the following best refers to a field? The column, "Publisher" The cell, "$230.00" All the records in the database The entire second row
the column,
Which of the following is a characteristic of relational database? Data synchronization across related tables is achieved by avoiding referential integrity. One relationship exists in a relational database—the many-to-many relationship. The common field in one table is the primary key, whereas the common field in a related table is the foreign key. A dimension refers to the link between tables that defines how the data is related.
the common field in one table is the primary key, whereas the common field in a related table is the foreign key
The following is a database of books in a library. From this database, which of the following refers to a record? The cell, "$230.00" The entire second row All the records in the database The column, "Publisher"
the entire second row
June Summers joins a university. The university allows new students to choose between two study plans and update it in their Fresher's List. Instead of choosing between the two plans, June writes a study plan that does not exist in the university's list of study plans. Upon review, the university administrators are confused with this nonexistent entry. Which problem is best described in this example? The inappropriate data problem The data inconsistency problem The data redundancy problem The incomplete data problem
the inappropriate data problem
Cascading style sheets allow you to quickly change? a. from server-side processing to client-side processing b. to a more secure transport protocol c. the rules for applying formatting to an HTML document d. from HTML to XML.
the rules for applying formatting to an HTML document
Which of the following best denotes a safe primary key for the employee database? The social security number of each employee The credit card number of each employee The staff ID of each employee The last name of each employee
the staff ID of each employee
Which of the following is true of lists? They are relatively expensive to maintain than databases. They actively avoid data redundancy. They are inefficient when used as a shared resource for multiple users. They do not lead to data inconsistency.
they are inefficient when used as a shared resource for multiple users
Which of the following statements is NOT true of databases? They can organize complex data at ease. They promote data integrity through data centralization. They are invariably cheaper to build and maintain than lists. They use normalization techniques to avoid data redundancy problems.
they are invariably cheaper to build and maintain than lists
Why are client/server networks usually installed in businesses?
they are more scalable than P2P networks
On client/server networks, routers (1 point) move data efficiently from node to node on the internal network. route data between two collision domains on a single network. are necessary only in networks using the ring topology. transfer data between two networks.
transfer data between two networks
on a client server network, routers
transfer data between two networks
A query is used to extract a subset of data from a database. True False
true
A web server is used to host websites on a client/server network. (1 point) True False
true
MIME is the protocol that supports sending files as e-mail attachments. (1 point) True False
true
Most modern operating systems include some type of NOS functionality. (1 point) True False
true
Your Internet service provider has a default domain name server to translate a URL into an IP address. (1 point) True False
true