MIS Exam Chapter 6, 7, 8, 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A distributed database:

Consists of two or more files located in different sites either on the same network or a different one

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

Cyber warfare

The total time it takes to complete a business process, from start to finish, is called its ________ time.

Cycle

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack

DDoS

What service converts natural language names to IP addresses?

DNS

Data ________ occurs when the same data is duplicated in multiple files of a database.

Data Redundancy

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name.

Data inconsistencies

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

Data scrubbing

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

Digital

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Disaster Recovery Planning

Client/server computing is a:

Distributed computing model which some of the processing power is located within small, inexpensive client computing like laptops

A schematic of the entire database that describes the relationships in a database is called a(n):

Entity-relationship diagram

Web browser software requests web pages from the Internet using which of the following protocols?

HTTP

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

Hotspots

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?

Identify Sequences

When hackers gain access to a database containing your personal private information, this is an example of:

Identity theft

The business value of an effective supply chain management system includes all of the following except:

Improved delivery service

Blockchain refers to a technology that:

Is a growing list of records linked using cryptography

A field identified in a record as holding the unique identifier for that record is called the:

Key field

________ is spyware that logs and transmits everything a user types.

Keylogger

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business?

Managing the supply chain

Which of the following is a DBMS for desktop computers?

Microsoft Access

Two-factor authentication utilizes a(n):

Multistep process of authentication

The backbone networks of the Internet are typically owned by long-distance telephone companies called:

Network Service Providers

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

Normalization

Predictive search in Google's search engine:

Predicts what you are looking for as you enter words into the query box

A field identified in a table as holding the unique identifier of the table's records is called the:

Primary Key

Walmart's continuous replenishment system is an example of a(n) ________ model.

Pull-based

A supply chain driven by forecasts of consumer demand follows a(n) ________ model.

Push-based Model

Which type of application does Macy's use to track items for sale on store shelves?

RFID

Which of the following pulls content from websites and feeds it automatically to users' computers?

RSS

Fault tolerant information systems offer 100 percent availability because they use:

Redundant hardware, software, and power supplies

A(n) ________ represent data as two-dimensional tables.

Relational DBMS

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

In a table for customers, the information about a single customer resides in a single:

Row

Which of the following is the most prominent data manipulation language today?

SQL

Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

Safety stock

An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:

Spear Phishing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a(n):

Supply Chain

Which of the following is not a method for performing a data quality audit?

Surveying data definition and query files

On which of the following protocols is the Internet based?

TCP/IP

IPv6 has been developed in order to:

create more IP addresses

Data cleansing not only corrects errors but also:

enforces consistency among different sets of data

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

Access Point

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

Airport Code

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?

Application Server

What are the four layers of the TCP/IP reference model?

Application, Transport, Internet, Network

A characteristic or quality that describes a particular database entity is called a(n):

Attribute

A database ________ describes a database entity.

Attribute

All of the following are physical components of an RFID system except:

Bar Code

Enterprise software is built around thousands of predefined business processes that reflect:

Best practices

All of the following are currently being used as traits that can be profiled by biometric authentication except:

Body odor

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.

Bullwhip effect

Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company?

CLTV

Uncertainties in the supply chain often lead to:

The bullwhip effect

All of the following have contributed to an increase in software flaws except:

The increase in malicious intruders seeking system access

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:

The internet of things

Microsoft Access's data dictionary displays all of the following information about a field except the:

The organization within the organization that is responsible for maintaining the data

Which process is used to protect transmitted data in a VPN?

Tunneling

In a relational database, a record is referred to in technical terms as a(n):

Tuple

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

Two factor authentication

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

Uniform Resource Locator (URL)

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

OLAP enables:

Users to view the data in different ways using multiple dimensions

WPA2 is a more effective way to secure a wireless network than WEP because it:

Uses more encryption keys

A VPN:

Virtual Private Network

Which of the following statements about Internet security is not true.

VoIP is more secure than switched voice network

A network that covers entire geographical regions is most commonly referred to as a(n):

Wide Area Network

The logical view of a database:

presents data as they would be perceived by end users


संबंधित स्टडी सेट्स

Paper chromatography of Photosynthetic Pigments

View Set

M12 Chapter 12 On Board Diagnostics (OBDII) and Computer Systems

View Set

Chapter 10: Digital Marketing and Social Networking

View Set

9facts, Thomas Jefferson, and the committee of five notes

View Set

ACCT 3210: Chapter 11 Preview: PP&E and Intangible Assets-Utilization and Dispositions

View Set

Chapter 7- Designing Organizational Structure

View Set