MIS 352 Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is malware that logs and transmits everything a user types.

A keylogger

To use the analog telephone system for sending digital data, you must also use

A modem

Which signal types are represented by a continuous waveform?

Analog

Microsoft SQL Server is a(n)

DBMS for midrange computers

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called

Data scrubbing

________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

Data security

Which of the following statements about enterprise applications is not true?

Enterprise applications are best implemented when few changes in business processes are required.

Which of the following is not one of the top five search engines?

Facebook

A database record is a grouping of characters into a word, a group of words, or a complete number.

False

A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.

False

All CRM packages contain modules for PRM and ERM.

False

Central large mainframe computing has largely replaced client/server computing.

False

Data scrubbing is a more intensive corrective process than data cleansing.

False

Implementing a Web interface for an organization's internal database usually requires substantial changes to be made to the database.

False

In associations, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.

False

Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.

False

RFID technology is being gradually replaced by less costly technologies such as WSNs.

False

Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.

False

TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.

False

The term cracker is used to identify a hacker whose specialty is breaking open security systems.

False

Which digital cellular standard is used widely throughout the world except the United States?

GSM

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

Intrusion detection systems

A network that spans a city, and sometimes its major suburbs as well, is called a

MAN.

Smaller firms may outsource some or many security functions to

MSSPs

Which of the following is not a DBMS for midrange computers?

Microsoft Access

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

What technology allows people to have content pulled from Web sites and fed automatically to their computers?

RSS

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

Data ________ occurs when the same data is duplicated in multiple files of a database.

Redundancy

A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.

Router

The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called

SEO

________ identify the access points in a Wi-Fi network

SSIDs

Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.

Second generation

________ combine the functionality of a cell phone with the computing of a laptop.

Smartphones

Which of the following statements is not true about search engines?

There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

How do software vendors correct flaws in their software after it has been distributed?

They issue patches

A physical view shows data as it is actually organized and structured on the data storage media.

True

An application that transfers information from an organization's internal database to a Web server for delivery as part of a Web page to the user is called middleware.

True

As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.

True

Before the Internet, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

DBMS have a data definition capability to specify the structure of the content of the database.

True

Every record in a file should contain at least one key field.

True

High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.

True

In 2013, Panda Security reported approximately 30 million new kinds of malware strains.

True

In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

True

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

True

The organizational function that is in charge of policies and procedures for managing internal data resources is called data administration.

True

The policies and processes for managing the integrity and security of data in a firm are referred to as data governance.

True

To perform multidimensional data analysis, you would use OLAP.

True

Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.

True

Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.

True

When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.

True

You can manipulate data on a Web server by using a CGI script.

True

Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?

WPA2

The 802.11 set of standards is known as

Wi-Fi

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with

a crow's foot topped by a short mark.

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

access point

All of the following are types of information systems general controls except

application controls

T1 lines

are high-speed, leased data lines providing guaranteed service levels.

Customer service modules in CRM systems provide tools for

assigning and managing customer service requests.

A(n) ________ is a characteristic or quality that describes a database entity.

attribute

Biometric Authentication

can use a person's voice as a unique, measurable trait.

Hackers create a botnet by

causing other people's computers to become "zombie" PCs following a master computer

The telephone system is an example of a ________ network.

circuit-switched

Computer forensics tasks include all of the following except

collecting physical evidence on the computer.

The select operation

creates a subset consisting of all records in the file that meet stated criteria.

CRM systems help businesses obtain which business objective?

customer and supplier intimacy

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.

deep-packet inspection

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

digital

Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.

e-business suites

The most common type of electronic evidence is

email

You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?

employees

A firewall allows the organization to

enforce a security policy on data exchanged between its network and the Internet

Data mining is a tool for allowing users to

find hidden relationships in data.

A data warehouse is composed of

historic and current internal data.

The Sarbanes-Oxley Act

imposes responsibility on companies and management to safeguard the accuracy of financial information.

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)

information policy

Shopping bots use ________ software for searching the Internet.

intelligent agent

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

may be accessible by anyone who has access to the same network.

Rigorous password systems

may hinder employee productivity

Which of the following features enables a DBMS to reduce data redundancy and inconsistency?

minimizes isolated files with repeated data

Which of the following is not one of the four types of customers described in the case study on Graybar?

niche customers

Digital subscriber lines

operate over existing telephone lines to carry voice, data, and video.

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called

packet switching

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?

peer-to-peer

A DBMS makes the

physical database available for different logical views

The logical view of a database

presents data as they would be perceived by end users.

The traditional file environment does not typically have a problem with

program-data independence

Pharming involves

redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.

Which of the following is not one of the techniques used in Web mining?

server mining

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

symmetric key encryption

The communications lines in a client/server environment are specifically vulnerable to

tapping

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called

the Internet of things

Which process is used to protect transmitted data in a VPN?

tunneling

Client software in a client/server environment is specifically vulnerable to

unauthorized access

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the

upstream portion of the supply chain.

A digital certificate system

uses third-party CAs to validate a user's identity.

A(n) ________ is software for locating and managing stored Web pages.

web server

Next-generation enterprise suites use ________ and SOA to link to systems of customers and suppliers.

web services


संबंधित स्टडी सेट्स

Timeless Season One Episode Two(Lincoln's Assassination)

View Set

B. Policy Riders, Provisions, Options and Exclusions-Reinstatement Provision

View Set

Eight Sushi Lounge (Bucket List, Mind Boggling, To Share, This & That)

View Set

Domain 6: Security assessment and testing (11th)

View Set

Using Resources and Reference Materials for Editing

View Set

Micro HW Practice Questions - ch 19, 32, 33

View Set

Essentials of pharmacology Chapter 17

View Set