MIS Exam Chapter 6, 7, 8, 9
A distributed database:
Consists of two or more files located in different sites either on the same network or a different one
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
Cyber warfare
The total time it takes to complete a business process, from start to finish, is called its ________ time.
Cycle
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack
DDoS
What service converts natural language names to IP addresses?
DNS
Data ________ occurs when the same data is duplicated in multiple files of a database.
Data Redundancy
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?
Data dictionary
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name.
Data inconsistencies
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
Data scrubbing
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
Digital
Which of the following focuses primarily on the technical issues of keeping systems up and running?
Disaster Recovery Planning
Client/server computing is a:
Distributed computing model which some of the processing power is located within small, inexpensive client computing like laptops
A schematic of the entire database that describes the relationships in a database is called a(n):
Entity-relationship diagram
Web browser software requests web pages from the Internet using which of the following protocols?
HTTP
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
Hotspots
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
Identify Sequences
When hackers gain access to a database containing your personal private information, this is an example of:
Identity theft
The business value of an effective supply chain management system includes all of the following except:
Improved delivery service
Blockchain refers to a technology that:
Is a growing list of records linked using cryptography
A field identified in a record as holding the unique identifier for that record is called the:
Key field
________ is spyware that logs and transmits everything a user types.
Keylogger
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?
Managing the supply chain
Which of the following is a DBMS for desktop computers?
Microsoft Access
Two-factor authentication utilizes a(n):
Multistep process of authentication
The backbone networks of the Internet are typically owned by long-distance telephone companies called:
Network Service Providers
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
Normalization
Predictive search in Google's search engine:
Predicts what you are looking for as you enter words into the query box
A field identified in a table as holding the unique identifier of the table's records is called the:
Primary Key
Walmart's continuous replenishment system is an example of a(n) ________ model.
Pull-based
A supply chain driven by forecasts of consumer demand follows a(n) ________ model.
Push-based Model
Which type of application does Macy's use to track items for sale on store shelves?
RFID
Which of the following pulls content from websites and feeds it automatically to users' computers?
RSS
Fault tolerant information systems offer 100 percent availability because they use:
Redundant hardware, software, and power supplies
A(n) ________ represent data as two-dimensional tables.
Relational DBMS
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?
Router
In a table for customers, the information about a single customer resides in a single:
Row
Which of the following is the most prominent data manipulation language today?
SQL
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:
Spear Phishing
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n):
Supply Chain
Which of the following is not a method for performing a data quality audit?
Surveying data definition and query files
On which of the following protocols is the Internet based?
TCP/IP
IPv6 has been developed in order to:
create more IP addresses
Data cleansing not only corrects errors but also:
enforces consistency among different sets of data
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
Access Point
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
Airport Code
Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?
Application Server
What are the four layers of the TCP/IP reference model?
Application, Transport, Internet, Network
A characteristic or quality that describes a particular database entity is called a(n):
Attribute
A database ________ describes a database entity.
Attribute
All of the following are physical components of an RFID system except:
Bar Code
Enterprise software is built around thousands of predefined business processes that reflect:
Best practices
All of the following are currently being used as traits that can be profiled by biometric authentication except:
Body odor
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
Bullwhip effect
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?
CLTV
Uncertainties in the supply chain often lead to:
The bullwhip effect
All of the following have contributed to an increase in software flaws except:
The increase in malicious intruders seeking system access
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
The internet of things
Microsoft Access's data dictionary displays all of the following information about a field except the:
The organization within the organization that is responsible for maintaining the data
Which process is used to protect transmitted data in a VPN?
Tunneling
In a relational database, a record is referred to in technical terms as a(n):
Tuple
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
Two factor authentication
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
Uniform Resource Locator (URL)
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
OLAP enables:
Users to view the data in different ways using multiple dimensions
WPA2 is a more effective way to secure a wireless network than WEP because it:
Uses more encryption keys
A VPN:
Virtual Private Network
Which of the following statements about Internet security is not true.
VoIP is more secure than switched voice network
A network that covers entire geographical regions is most commonly referred to as a(n):
Wide Area Network
The logical view of a database:
presents data as they would be perceived by end users