MIS 301 Exam 1
LTE is ________ cellular technology
4G
______ is an attack by a programmer developing a system
A trojan horse
______ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process
BPI
______ is the most difficult, radical, lengthy and comprehensive strategy
BPR
What is an example of a SCADA attack?
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant
Hackets would use a botnet to perform a ________
DoS
______ is a remote attack requiring no user action
DoS
A network that is restricted to a single building is a ________
LAN
The ______ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected
Opt-Out
The IT infrastructure is
The IT components, IT services, IT personnel
The internet is a ________
WAN
_______ refers to determining who is responsible for actions that were taken
accountability
The _________ approach states that an ethical action is the one that provides the most good or does the least harm
utilitarian
in ________, recipients of your marketing notices send information about your product to their friends
viral marketing
________ organizations are only online
virtual
which of the following is NOT a characteristic of Big Data? - velocity - viscous - volume - variety
viscous
An information system's _____ is the likelihood that the system or resource will be compromised by a ___ that will result in its ____ to further attacks
vulnerability; threat; exposure
A data __________ Is a repository of historical data that are organized by subject to support decision makers in the organization
warehouse
IT _____ be used to create a competitive advantage _____.
can; when it is used effectively
________ organizations have physical and online dimensions
clicks - and - mortar
________ cables are made of copper
coaxial
the ________ approach highlights the interlocking relationships that underlie all societies
common good
what is the correct order of the KMS cycle?
create, capture, refine, store, manage, disseminate
Which shape represents questions?
diamond
________ Is a disadvantage of fiber-optic cable
difficult to work with
______ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others
information privacy
the _______ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it
opt - in
the _______ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected
opt - out
the __________ key is an identifier field that uniquely identifies a record
primary
________ issues involve collecting, storing and disseminating information about individuals
privacy
the ________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties
rights
each relational database table contains records (listed in __________) and attributes (listed in __________)
rows; columns
________ transmission systems can have a large coverage area but their signals experience propagation delay
satellite
________ Networks are an emerging technology that is becoming increasingly important to help organizations manage their data flow across their enterprise networks
Software-defined
careless internet surfing is ______ and is an ______ mistake
a human error; unintentional
_________ causes pop-up advertisements to appear on your screen
adware
the __________ creates links between two tables
foreign key
Whereas phishing attacks are _____, denial of services attacks are _____
remote attacks requiring use action; remote attacks requiring no user action
_________ means that you accept the consequences of your decisions and actions
responsibility
________ is pestware that uses your computer as a launch pad for unsolicited email, usually advertising for products and services
spamware
which of the following is not "unstructured data"
spreadsheet
_________ collects personal information about users without their consent
spyware
keystroke loggers and screen scrapers are examples of _______
spyware
an electronic ________ is a website that represents a single store
storefront
considering the following tables, __________ is a primary key
student table: ID
_______ is a remote attack requiring user action
virus
how many branches should be followed by a question?
2
________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging
3G
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True or false
False
only a few ________ satellites are needed for global coverage
GEO
________ defines how messages are formulated and how their receivers interpret them
HTTP
What is an example of a property issue?
How should we handle illegally copying copyrighted software?
________ developed because we have run out of IP addresses in the original IP addressing scheme
IPv6
satellite telephone services are provided through ________ satellites
LEO
________ satellites are used to run the GPS system
MEO
Dashboards are used in which of the following processes?
Monitoring process performance
False about QR codes
QR codes are larger than barcodes because they store information both horizontally and vertically
__________ is the most popular query language used for interacting with a database
SQL
which of the following is the most prominent data manipulation language today?
SQL
________ is the protocol of the internet
TCP/IP
The ________ layer of TCP/IP provides communication and packet services
Transport
T/F A foreign key is a primary key in another file
True
blacklisting is when everything can run except what is on the list. T or F lol creagan
True
__________ is a private network that uses a public network to connect users
VPN
What is the correct order of networks from largest to smallest?
WAN,MAN,LAN,PAN
_______ issues involve the authenticity, fidelity, and correctness of information that is collected and processed
accuracy
in ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission
affiliate marketing
each characteristic or quality of a particular entity is called an __________
attribute
data hierarchy listed from smallest to largest
bit, byte, field, record, file, database
Bandwidth is stated in _____ per second
bits
Which of the following is NOT an example of alien software? - adware -blockware -spyware -spamware
blockware
________ is a short range wireless network
bluetooth
________ organizations are purely physical
brick-and-mortar
a __________ is a group of eight __________
byte; bits
the ______ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard
fairness
________ cables are made of glass
fiber-optic
_______ is a communications control
firewall
in ________ auctions, sellers solicit bids from many potential buyers; these auctions results in ________ prices over time.
forward; higher
________ is NOT an advantage of twisted-pair wire
high bandwidth
________ is an advantage of a coaxial cable
high bandwidth
A __________ site is a fully configured computer facility with all the company's services, communication links and physical plant operations
hot
Which of the following is not in the business analytics domain?
in-memory computing diamon
An order from a customer is a(n) _____ for a business process
input
the ________ is a network of networks
internet
the ________ layer of TCP/IP is responsible for addressing, routing and packaging data packets
internet
intellectual capital is another term for __________
knowledge
_______ is an example of a pre-digital data storage tat is comparable to a database
library card catalog
A data __________ is a low-cost, scaled-down version of a data __________ that is designed for the end-user needs in an SBU or an individual department
mart; warehouse
________ is a broadcast medium
microwave
________ transmission systems transmit data through electromagnetic waves
microwave
you use your smartphone to look up how much money you have in your bank account. This is an example of ____________ commerce
mobile
with ________, customers use the internet to self-configure products or services
product customization
In public - key encryption, the _______ key is used for locking and the __________ key is used for unlocking
public; private
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted
radio
Which shape represents actions?
rectangle
database systems minimize __________
redundancy
What is NOT a basic function of TCP/IP?
responsible for disassembling, delivering and reassembling data during transmission
in ________ auctions, one buyer wants to purchase a product; these auctions result in ________ prices over time
reverse; lower
according to the textbook, ________ is the most widely available cable medium
twisted pair
________ is a cable medium
twisted-pair
the relational database model is based on the concept of __________- dimensional tables
two
The ______ approach states that an ethical action is the one that provides the most good or does the least harm
utilitarian