ISYS exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following types of reports would be the least likely output of PowerBI or Tableau?

A list of all customers and their mailing addresses

Which of the following statements best demonstrates how a data mart is used?

A specific department or division uses the data mart designed for them.

A company located in a non-EU country sells products to EU countries. The CEO has started to collect all data from website visitors and has not invested in a GDPR-compliant information system. What will be the repercussions for this company?

Administrative GDPR fines could be applied

In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with a maximum speed of up to 10 Gbps.

Asynchronous Transfer Mode

How can Internet applications for software distribution help mitigate computer security problems?

By distribution of security updates and patches through downloads

In the context of a database marketing campaign, _______ tells a business how much it should spend to maintain a relationship

CLTV

Before establishing a security program, organizations should ___

Conduct basic risk analysis

A locally owned restaurant is trying to compete with another restaurant that moved into town. The owners of the locally owned restaurant have a background in application development. What is an example of how the owners can use their skills to stay competitive against the national chain?

Create a mobile app that customers could use to see promotions and collect points

A company has decided to allow a hybrid workforce with employees alternating days of the week they are expected to be in the office. The employees enjoy the flexibility. How does the organization also benefit from this?

Decreased costs associated with office space and utilities

How job deskilling lead to improved job satisfaction?

Decreased repetitive and uninteresting tasks

A company has several sales representatives. Each sales representative fills the information of the sale and client in their computer and stores it in a central database. This is an example of a ________.

Distributed processing

Which growing application of IoT is used to enhance manufacturing processes and data analytics on factory floors?

Industrial internet of things (IIoT)

A security analyst has determined that the firewall is inadequate to detect suspicious activity on the network. The analyst also wants to be notified when certain activity patterns are detected. Which of the following would provide the best solution to this situation?

Intrusion detection systems

Which statement is true of an intranet?

It helps organizations move from a calendar-based document-publishing strategy to one based on events.

Identify a true statement about data collected on the Web.

It must be used and interpreted with caution

Which of the following is one reason for the importance of protocols such as TCP/IP?

It provides a common language between different platforms

What is a potential drawback of telecommuting?

Lack of necessary supplies or equipment

__ are compatible with the IBM System/360 line introduced in 1965.

Mainframe computers

When contrasting a network model and a hierarchical model, the main difference is that a record in a network model can have:

Multiple parent and child records

An organization recently hired a new network administrator. As the network admin, they discovered that the previous admin was querying the customer data and possibly selling the information to other organizations. Based on the log files, this took place last year and has not happened since they left three months ago. What should the organization do to stay GDPR compliant?

Notify the customers of the breach within 72 hours of discovery.

Walmart self-checkouts are an example of what type of technology?

POS

Which healthcare system can make interactive medical tools available to the public

Personal health information systems

One of the new technologies with Web 3.0 is VR technology. How do retail businesses use this new technology to develop their employees?

Provides training to employees to perform job functions

A colleague introduced you to a client for you to take over the client's needs. The colleague no longer needs to be involved in the email communication (they received a promotion). What can you do to include the colleague in the email but prevent them from being accidentally caught in a reply unnecessarily?

Put the colleague's email as a BCC

Which statement differentiates between read-only memory (ROM) and random access memory (RAM)?

ROM is nonvolatile memory, whereas RAM is volatile memory.

When considering the concept of database marketing, which of the following would not be an acceptable example of the concept?

Recruit employees more effectively and at a lower cost

A restaurant has major losses due to food going to waste. Which IIoT applications are more likely to help with the problem?

Set inventory and expiration dates and shore notifications

A security analyst is arguing with the CEO of an online marketplace for adding security to a company's web server. Which is the best argument to support this goal?

Shoppers will abandon a retailer that has been hacked

Despite increased laws and regulations, why is data privacy still not protected as consumers expect?

Some loopholes prevent any ramifications.

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

Spear phishing attacks are targeted toward a specific person or a group.

Data warehouses are sometimes called hypercubes because they _____.

Store multidimensional data

Identify the type of computer that has the highest price

Supercomputers

A business representative commented in a crowd that news reporters unintentionally heard. The story has been reported, and the CEO seeks to reprimand him. What did the business representative violate?

The business networking principle of don't say or do anything that you would not want on the front-page paper. The business networking principle of knowing how to communicate openly.

In the context of Internet services, what is Internet telephony's drawback?

The call quality of not as good as regular phone lines

A security analyst has just received an email that their hospital data has been stolen. According to a study published in 2021, which statistic best represents the result of this stolen data?

The company will incur millions in recovery costs

Not all citizens can access similar technologies in a rural community. Why is this?

The digital divide exists in rural areas due to a lack of infrastructure to support high-speed Internet.

________________ is a way to measure an information system's effectiveness.

The efficiency in delivering information

A CFO of an online marketplace has just realized a drop in revenue since the last cyber attack on the website. The security analyst's most likely explanation is _____.

The security upgrade has slowed the online marketplace

In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six-time slots.

Time division multiple access

Why do online classes reduce the cost of having renowned experts lecture?

Travel expenses are not a factor.

The Internet is important in helping organizations reduce expenses because ___

Web applications can be used with minimum costs

Which approach to set up a distributed database management system (DDBMS) combines the fragmentation approach and the replication approach?

allocation

Spoofing happens when:

an illegitimate program poses as a legitimate one.

In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.

censorship

Which text form needs to be unscrambled using a decryption key?

ciphertext

Many computers have been stolen from a university computer lab. Which solution should the security team implement?

corner bolts

What additional factors play a role in a customer's decision to purchase a product or service other than focus and differentiation?

cost

Comprehensive security measures must ensure that access to an organization's _______ is granted only to authorized users and trusted business partners.

extranets

If you want to search for a restaurant that a friend recommends, but you don't remember the restaurant's name, which tool is more likely to help you find the restaurant?

facebooks graph search

A disadvantage of Power BI is that it only accepts data from relational databases in the cloud.

false

A server company has another site set up in a different region than the main servers in case of a disaster. It is expected that the hot site should be up and running as soon as the replacement servers are brought up.

false

A server is a set of programs for controlling and managing computer hardware and software.

false

Computers perform all tasks using a combination of arithmetic and logical operations.

false

Conventional computing methods are able to efficiently process and manage big data.

false

Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a proactive to a reactive process.

false

In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).

false

Spreadsheet software is more powerful than financial planning software.

false

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

false

In the context of directories on the Web, a human-powered directory uses crawlers to collect data.

false (users)

The Advanced Research Projects Agency Network (ARPANET) owns the Internet.

false, no one does

Jane has decided she wants a camo-colored ATV for her birthday. She is looking at different manufacturers, unsure of what model she wants. If a single dealership carries both models and she likes them equally, what will likely be the deciding factor for her choice?

final costs

A customer is looking to buy a new car. They cannot reach anyone on the phone at the local car dealership. Predict what the customer will most likely do next.

go online and find another dealership

Java and C++ are examples of _____.

high level languages

Jared makes two copies of an antivirus software package he bought and sold one of the copies to Joshua. How would Jared's actions be classified in this situation?

illegal and unethical

In the context of using information technologies for a competitive advantage, distinguish the best strategy by focusing on the following:

increasing revenue by selling existing products to new customers.

The advantage of the _____ access method is that both sequential and random access can be used to access records, depending on the number being accessed.

indexed sequential

In computer and network security, _____ refers to the accuracy of information resources within an organization.

integrity

If boundaries such as maximum and minimum values allowed for a field are a requirement for a data model, which component would be responsible for that feature?

integrity rules

To enable communication between a video card and memory, you would use a(n) _____.

internal bus

Internet protocol IP operates at the network layer because:

it uses IP addresses to route packets

A DSL requires a modem because:

it uses a medium for analog signals to connect to a digital device.

If a program does not require separate documentation, it is written in what language?

javascript

A(n) _____ is a common output device for soft copy.

liquid crystal display

A security analyst has seen the system performance slow after installing a logic design application. The application contains a Trojan program, but the performance issue spreads across the network. What is the most likely cause of this issue?

logic bomb

What should the industry do if they realize the buyer power is too high?

make it difficult to switch providers

Advertising and marketing analytics, in-app analytics, and performance analytics are three popular types of ________ analytics.

mobile

What is an example of a client-based e-mail program?

mozilla thunderbird

In the URL http://www.rentalmarti.com/suv/news.html Which part indicates the name of the document?

news.html

Choose the correct code in which the source code must be translated into in order to make a computer understand a program.

object

How has technology helped small businesses differentiate themselves?

offer better and faster customer service

Syndication feeds are one way of announcing the availability of a _____.

podcast

By using just-in-time delivery of goods, a company can reduce costs by _______.

requiring raw material only when needed

__ is a computer crime that involves destroying or disrupting computer services.

sabotage

In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over _____.

secure sockets layer

You want to isolate a part of the LAN dedicated to processing internal files, so external nodes don't need access. What process can you use to do this?

segmenting

In the context of Web and network privacy, an acceptable use policy is a:

set of rules specifying a system's legal and ethical use and the consequences of non-compliance.

A small organization is proliferating, using its personnel to enter data and run manual queries for patterns. What would you recommend the business do to use the personnel better?

start using microsoft access

Which object-oriented language is used to develop apps for macOS and iOS?

swift

In the context of big data, velocity is _________.

the speed with which the data has to be gathered and processed

Line phone devices are an example of __

thin clients

Netflix replacing Blockbuster is an example of what type of Five Force?

threat of new entrants

A grocery retailer offering club cards that give customers big discounts is one example of an overall cost leadership strategy.

true

According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.

true

An organization's comprehensive security plan should include procedures for installing software patches and updates regularly.

true

Apache Hadoop is the most commonly used platform for big data analytics.

true

Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling.

true

If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

true

Information technologies have led to job deskilling.

true

Inkjet printers produce characters by projecting onto paper electrically charged droplets of ink that create an image.

true

If high-speed Internet was not available for developing countries, what is available for their citizens to use instead?

wireless and mobile networks


संबंधित स्टडी सेट्स

Management- Motivation & Incentives

View Set

Pre-Week 7 Assignment (Autonomic Nervous System)

View Set

CARDIO: Practice Questions (Exam 2)

View Set

computer networking Semester 2 Unit 10

View Set

9.3 AP World: Technology and the Environment

View Set

Chapter 6 - Macroeconomics: The Big Picture

View Set

ABeka Fifth Grade Spelling List 25

View Set