MIS 6 ĐẾN 15, MIS 412--Chapter 3, MIS Chapter 1, MIS Chapter 2, MIS Chapter 5, MIS Chapter 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

D

A CSF approach to establishing an enterprise's information requirements is especially suitable for: a. distinguishing between individual and organizational objectives. b. identifying the key entities and attributes of the organization's data. c. understanding how organizational units define critical data. d. the development of DSSs and ESSs.

A

A DBMS makes the A) physical database available for different logical views. B) logical database available for different analytical views. C) physical database available for different analytical views. D) logical database available for different physical views.

D

A DBMS reduces data redundancy and inconsistency by A) enforcing referential integrity. B) uncoupling program and data. C) utilizing a data dictionary. D) minimizing isolated files with repeated data.

A

A VPN A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications.

D

A ________________________ is very important to a knowledge worker's system. a. careful filing system b. financial analysis system c. CAD capability d. user-friendly interface

D

A characteristic or quality describing an entity is called a(n) A) field. B) tuple. C) key field. D) attribute.

A

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because A) a data mart typically focuses on a single subject area or line of business. B) all the information is historical. C) a data mart uses a Web interface. D) all of the information belongs to a single company.

D

A data warehouse is composed of A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data.

B

A field identified in a record as holding the unique identifier for that record is called the A) primary key. B) key field. C) primary field. D) unique ID.

A

A field identified in a table as holding the unique identifier of the table's records is called the A) primary key. B) key field. C) primary field. D) unique ID.

B

A nationwide magazine publisher has hired you to help analyze their social media datasets to determine which of their news publications are seen as the most trustworthy. Which of the following tools would you use to analyze this data? A) text mining tools B) sentiment analysis software C) Web usage mining technologies D) data mining software for identifying associations

D

A network that covers entire geographical regions is most commonly referred to as a(n) A) local area network. B) intranet. C) peer-to-peer network. D) wide area network.

B

A network that spans a city, and sometimes its major suburbs as well, is called a A) CAN. B) MAN. C) LAN. D) WAN.

A

A one-to-one relationship between two entities is symbolized in a diagram by a line that ends with A) two short marks. B) one short mark. C) a crow's foot. D) a crow's foot topped by a short mark.

B

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of Select one: a. pharming. b. click fraud. c. spoofing. d. phishing

C

A schematic of the entire database that describes the relationships in a database is called a(n) A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram.

D

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes Select one: a. CRM modules. b. ERM software. c. SCM software. d. ERP systems

A

All of the following are physical components of an RFID system except A) bar code. B) antenna. C) radio transmitters. D) tags.

A

All of the following are technologies used to analyze and manage big data except A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms.

A

An alternative to using application server software for interfacing between a Web server and back-end databases is A) CGI. B) HTML. C) Java. D) SQL.

A

An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the A) data dictionary. B) data definition diagram. C) entity-relationship diagram. D) relationship dictionary.

C

Bandwidth is the A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second.

A

Big data does not refer to A) datasets with fewer than a billion records. B) datasets with unstructured data. C) machine-generated data (i.e. from sensors). D) data created by social media (i.e. tweets, Facebook Likes).

D

DBMS for midrange computers include all of the following except A) DB2. B) Oracle. C) Microsoft SQL Server. D) Microsoft Access.

B

DBMSs typically include report-generating tools in order to A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis.

D

Data cleansing not only corrects errors but also A) establishes logical relationships between data. B) structures data. C) normalizes data. D) enforces consistency among different sets of data.

B

Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad-hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports.

C

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization.

A

Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased from long-distance telephone companies. D) have up to twenty-four 64-Kbps channels.

A

Duplicate data in multiple data files is called data ________. A) redundancy B) repetition C) independence D) partitions

B

IPv6 is being developed in order to A) update the packet transmission protocols for higher bandwidth. B) create more IP addresses. C) allow for different levels of service. D) support Internet2.

A

In TCP/IP, IP is responsible for A) disassembling and reassembling of packets during transmission. B) establishing an Internet connection between two computers. C) moving packets over the network. D) sequencing the transfer of packets.

B

In a bus network Select one: a. signals are broadcast to the next station. b. signals are broadcast in both directions to the entire network. c. multiple hubs are organized in a hierarchy. d. messages pass from computer to computer in a loop

A

In a relational database, a record is referred to in technical terms as a(n) A) tuple. B) row. C) entity. D) field.

C

In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where. B) select, join, and where. C) select, project, and join. D) select, from, and join.

B

In a table for customers, the information about a single customer would reside in a single A) field. B) row. C) column. D) table.

B

In a telecommunications network architecture, a protocol is A) a device that handles the switching of voice and data in a local area network. B) a standard set of rules and procedures for control of communications in a network. C) a communications service for microcomputer users. D) the main computer in a telecommunications network.

C

In terms of data relationships, associations refers to A) events linked over time. B) patterns that describe a group to which an item belongs. C) occurrences linked to a single event. D) undiscovered groupings.

B

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A) books B) azimuth-interactive C) com D) none; there is no second-level domain in this name

A

Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless

D

Microsoft SQL Server is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) desktop relational DBMS. D) DBMS for midrange computers.

A

OLAP is a tool for enabling A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data.

A

Oracle Database Lite is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) mainframe relational DBMS. D) DBMS for midrange computers.

C

T1 lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are high-speed, leased data lines providing guaranteed service levels. D) have up to twenty-four 64-Kbps channels.

C

The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) client/server computing, packet switching, and the development of communications standards for linking networks and computers D) client/server computing, packet switching, and HTTP

A

The child domain of the root is the A) top-level domain. B) second-level domain. C) host name. D) domain extension.

A

The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called A) the Web of things. B) the Semantic Web. C) Internet2. D) a 3-D Web.

B

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources. A) batch processing B) data redundancy C) data independence D) online processing

B

The data dictionary serves as an important data management tool by A) assigning attributes to the data. B) creating an inventory of the data elements contained in the database. C) presenting data as end users or business specialists would perceive them. D) maintaining data in updated form.

B

The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n) A) hub. B) switch. C) router. D) NIC.

A

The join operation A) combines relational tables to provide the user with more information than is otherwise available. B) identifies the table from which the columns will be selected. C) creates a subset consisting of columns in a table. D) organizes elements into segments.

D

The logical view A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.

B

The major variables in project management are: a. scope, time, cost, and performance. b. scope, time, cost, quality, and risk. c. time, cost, quality, performance, and risk. d. time, cost, scope, and performance

B

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called A) multiplexing. B) packet switching. C) packet routing. D) ATM.

A

The most common Ethernet topology is Select one: a. bus b. star c. mesh d. ring

C

The most prominent data manipulation language today is A) Access. B) DB2. C) SQL. D) Crystal Reports.

A

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n) A) information policy. B) data definition file. C) data quality audit. D) data governance policy.

C

The principal method used in CFS analysis is to Select one: a. survey a large sample of managers on their objectives, decision-making process, and uses and needs for data and information. b. inventory all of the organization's information systems projects and assets and assign risk levels. c. interview a small number of top managers to identify their goals and criteria for achieving success. d. perform a weighted comparison of the criteria used to evaluate a system

A

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization. B) data scrubbing. C) data cleansing. D) data defining.

B

The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected.

D

The select operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) identifies the table from which the columns will be selected. D) creates a subset consisting of all records in the file that meet stated criteria.

B

The special organizational function whose responsibilities include physical database design and maintenance, is called A) data administration. B) database administration. C) information policy administration. D) data auditing.

B

The specialized language programmers use to add and change data in the database is called A) a data access language. B) a data manipulation language. C) structured query language. D) a data definition language.

D

The telephone system is an example of a ________ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched

C

The tool that enables users to view the same data in different ways using multiple dimensions is A) predictive analysis. B) SQL. C) OLAP. D) data mining.

A

The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops.

D

The type of database management approach that can handle multimedia is the A) hierarchical DBMS. B) relational DBMS. C) network DBMS. D) object-oriented DBMS.

C

The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) non-relational DBMS. B) mobile DBMS. C) relational DBMS. D) hierarchical DBMS.

A

To use the analog telephone system for sending digital data, you must also use A) a modem. B) a router. C) DSL. D) twisted wire.

B

Tools for analyzing data to help users find patterns, relationships, and insights and make better business decisions are known as A) DSS. B) business intelligence. C) OLAP. D) data mining.

C

Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network? Select one: a. communications lines b. corporate server c. client computer d. internal corporate back-end system

B

WSNs are designed for A) connecting multiple wireless computing devices. B) monitoring the physical environment. C) increasing the reach of Wi-Fi networks. D) tracking the movement of goods in a supply chain.

C

What are the four layers of the TCP/IP reference model? A) physical, application, transport, and network interface B) physical, application, Internet, and network interface C) application, transport, Internet, and network interface D) application, hardware, Internet, and network interface

B

What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) DNS C) IP D) HTTP

D

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) data normalization B) data accuracy C) data redundancy D) data inconsistency

A

Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD

B

Which of the following Internet connection types offers the greatest bandwidth? Select one: a. T1 b. T3 c. Cable d. DSL

B

Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT B) the entity CUSTOMER with the attribute PURCHASE C) the entity PRODUCT with the attribute PURCHASE D) the entity PRODUCT with the attribute CUSTOMER

B

Which of the following does not pose a security threat to wireless networks? Select one: a. broadcasted SSIDs b. SQL injection attacks c. scannability of radio frequency bands d. geographic range of wireless signals

C

Which of the following is not a characteristic of packet switching? A) Packets travel independently of each other. B) Packets are routed through many different paths. C) Packet switching requires point-to-point circuits. D) Packets include data for checking transmission errors.

C

Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying data definition and query files D) surveying end users about their perceptions of data quality

B

Which of the following is not one of the main problems with a traditional file environment? A) data inconsistency B) program-data independence C) lack of flexibility in creating ad-hoc reports D) poor security

D

Which of the following is not one of the techniques used in Web mining? A) content mining B) structure mining C) server mining D) user mining

A

Which of the following non-digital data storage items is most similar to a database? A) library card catalog B) cash register receipt C) doctor's office invoice D) list of sales totals on a spreadsheet

D

Which of the following services enables logging on to one computer system and working on another? A) FTP B) World Wide Web C) newsgroups D) telnet

D

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read.

B

Which of the following statements about the use of wikis by firms is not true? Select one: a. Users are able to modify wiki content contributed by others. b. They are most appropriate for information that must be revised but does not need to be available 24/7. c. They are inexpensive and easy to implement. d. They can be used as a central repository for all types of corporate data such as spreadsheets and e-mail

D

Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A) OLAP B) data warehouse C) data mart D) Hadoop

D

Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) IAB

A

Which protocol is the Internet based on? A) TCP/IP B) FTP C) packet-switching D) HTTP

D

Which signal types are represented by a continuous waveform? A) laser B) optical C) digital D) analog

B

Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN

A

Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) Windows domain network

C

Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN

C

You are creating a database to store temperature and wind data from national airport locations. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) address B) city C) airport code D) state

A

You are creating a video and animation sharing Web site whose content will be supplied by content, video, and applets stored in a database and you anticipate very high loads on the server. Which of the following DBMSs will most likely serve your needs? A) object-relational DBMS B) relational DBMS C) hierarchical DBMS D) OODBMS

D

You work for a national car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will want to use data mining software that is capable of A) identifying associations. B) identifying clusters. C) identifying sequences. D) classification.

C

You work for a retail clothing chain whose primary outlets are in shopping malls, and you are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use data mining software that is capable of A) identifying associations. B) identifying clusters. C) identifying sequences. D) classification.

D

________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Unified communications

B

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering


संबंधित स्टडी सेट्स

Month 10 Special Benefits for Seriously Disabled Individuals

View Set

Chapter 3 Review, CSC 134, Ch. 4

View Set

Intro to Religion EXAM 2-PowerPoint Questions

View Set

Economics Today The Macro View Ch.5 Public Spending and Public Choice

View Set

Individual Health Insurance Policy General Provisions

View Set