MIS Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The digital marketing firm Conversant made ____ variations of its ads to big clients (type answer without spaces and commas).

800,000

Which of the following statements BEST descnbes NoSQL's impact on today's relational DBMS product market? A. . NoSQL DBMS products will continue to grow and proliferate to meet today's data management demands, but the traditional relational DBMS market is still alive and well and will continue to be important to business users for many years to come. B. NoSQL's impact has been strong, and today there are no more relational DBMS products sold that still rely on SQL. C. NoSQL DBMSs today dominate market share. D. NoSQL has totally displaced traditional relational DBMS products. E. No SQL DBMS products originated in non-traditional database companies such as Amazon, Google, and Facebook, and these companies have grown while companies like Oracle, IBM, and Microsoft that produce relational DMBS products are about to go bankrupt.

A. . NoSQL DBMS products will continue to grow and proliferate to meet today's data management demands, but the traditional relational DBMS market is still alive and well and will continue to be important to business users for many years to come.

What is the difference between a database application and a database application program? A. A database application includes forms, reports, queries, and database application programs. B. A database application can be a part of a database application program. C. A database application program includes forms, reports, queries, and database application programs. D. These are two similar terms that mean the same thing. E. These are both two different components of a DBMS.

A. A database application includes forms, reports, queries, and database application programs.

Which of the following statements about data and financial losses due to computer security threats is correct? A. According to the Ponemon studies, data loss is the most significant cost of computer crime in 2012. B. The full extent of data and financial losses due to computer security threats is such an important metric that all companies carefully document and report these losses, and because it is so important typically the data are accurate to about 1 %. C. Computer crime data is obtained by rigorous insurance industry reports detailing the exact cost of losses. D. Losses due to human errors are enormous, so most organizations carefully document these losses and provide that information to investors. E. Reported losses from a survey in 2012 ranged from a few dollars for small companies to billions of dollars for the largest companies.

A. According to the Ponemon studies, data loss is the most significant cost of computer crime in 2012.

Which of the following statements about encryption is NOT accurate? A. Asymmetric encryption is simpler and much faster than symmetric encryption. B. Encryption is the process of transforming clear text into coded, unintelligible text for secure storage or communication. C. A key is a number used with an encryption algorithm that encryption data. D. Asymmetric encryption uses two keys: one key encodes the message, and the other key decodes the message. E. Symmetric encryption uses the same key to encode and decode data in the encryption process.

A. Asymmetric encryption is simpler and much faster than symmetric encryption.

Which of the following is NOT one of functions of a DBMS? A. Create a web home page for the database. B. Process a database. C. Query a database. D. Administer a database. E. Create a database.

A. Create a web home page for the database.

Of the five components of information systems, which are covered by technical safeguards? A. Hardware and software B. Software and procedures C. Data, people, and procedures D. People and procedures E. Data and procedures

A. Hardware and software

What government institution ran surveillance program collecting information from Microsoft, Facebook, and Huawei? A. NSA B. FBI C. CIA D. The Department of Homeland Security E. DIA

A. NSA

What insurance company ran a FB ad called "act your age"? A. Progressive B. State Farm C. Safe Auto D. Allstate E. Geico

A. Progressive

What trends underlie the rise of digital advertising? Select all that apply. A. Real-time bidding for showing online advertising B. Increased competition leading to increased advertising C. The rise of social networks D. The proliferation of smartphones and tablets E. Significant cost reductions associated with online advertising

A. Real-time bidding for showing online advertising C. The rise of social networks D. The proliferation of smartphones and tablets

Which of the following is NOT a valid activity of database administration performed by a DBMS? A. Running a query to answer a question B. Setting up a security system for the database C. Removing data that are no longer wanted or needed D. Backing up database data E. Adding structures to improve the performance of database applications

A. Running a query to answer a question

Which of the following is NOT one of the four elements of a database application? A. The DBMS B. Application programs that provide security, data consistency, and special-purpose processing C. Queries D. Forms E. Reports

A. The DBMS

Which of the following statements about virtual private networks (VPNs) is NOT accurate? A. VPNs provide secure communications over the Internet, but they are so complex and expensive that only the military and government organizations can use them. B. VPNs use encryption to secure communications over the public Internet. C. A secure connection gets established between a VPN client and a VPN server. D. Once an Internet connection is made, VPN software on the remote user's computer establishes a connection with a0020VPN server. E. VPNs use the Internet to create the appearance of private, secure connections.

A. VPNs provide secure communications over the Internet, but they are so complex and expensive that only the military and government organizations can use them.

Which of the following is NOT a component of a database? A. Web interfaces B. Tables C. Relationships among rows in tables D. Metadata E. Files

A. Web interfaces

A company-wide security policy should include all of the following EXCEPT A. the company-wide password(s) B. how employees and others can obtain copies of data stored about !hem C. how it will process that data D. what sensitive data the organization will store E. whether data will be shared with other organizations

A. the company-wide password(s)

Companies can use web services internally... A. to build internal information systems that use the same standards as cloud-based web services B. to get the advantages of pooled resources C. because it is identical to cloud-based web services and offers all the same advantages D. using their own custom-built, private internal standards E. to achieve elasticity

A. to build internal information systems that use the same standards as cloud-based web services

The drug smuggling ring using computer experts to improve logistics were from (select all that apply). A. France B. Belgium C. Germany D. The Netherlands E. UK

B. Blegium D. The Netherlands

Which of the following is NOT one of the identification and authentication techniques? A. Smart cards B. Malware safeguards C. User names D. Biometric authentication E. Passwords

B. Malware safeguards

What companies were the target of the 2013 cyber-attack in South Korea? Select all that apply. A. Online retailers B. News agencies C. Healthcare facilities D. Banks E. Educational institutions

B. New agencies D. Banks

Which of the following is NOT an example of a database? A. The table in a Microsoft Word document listing your textbooks for the current semester B. The home page for a company's web site C. A professor using Microsoft Access to keep track of student grades and contacts D. Microsoft Excel spreadsheet listing your favorite songs E. An Apple Mac's Numbers spreadsheet listing your friends and their Facebook contact information

B. The home page for a company's web site

What are some of the things mentioned in the article as profoundly changing the dynamics of advertising? Select all that apply. A. A new generation with a very different set of preferences B. Vast amount of data collected about consumers C. Third-party companies tracking and gathering intelligence D. Direct relationships with consumers through targeted ads E. A new set of privacy regulations affecting online advertising

B. Vast amount of data collected about consumers C. Third-party companies tracking and gathering intelligence D. Direct relationships with consumers through targeted ads

What is the purpose of a database? A. Databases are alternatives to word processing applications. B. It is a product from Oracle corporation to compete against Mlicrosoft's Excel. C. Databases help people keep track of things. D. Databases replace spreadsheets. E. Databases are useful for professors to track student grades but are not useful for anything else.

C. Databases help people keep track of things

Which of the following is NOT one of the five most expensive forms of computer crime attacks? A. Denial of services B. Malicious code C. IP-spoofing attacks D. Web-based attacks E. Malicious insiders

C. IP-spoofing attacks

According to the article, how is the line between advertising and media business becoming blurred? Select all that apply. A. Media businesses are buying advertising firms B. Media content is almost always paired with advertisement C. Media companies are producing content on behalf of advertisers D. Advertisers are hiring journalist to produce content E. Advertising firms are buying media businesses

C. Media companies are producing content on behalf of advertisers D. Advertisers are hiring journalist to produce content

Which of the following statements BEST describes a NoSQL DBMS? A. NoSQL is the new DBMA product from an alliance of Oracle and IBM that implements a relational DBMS without the need for SQL commands. B. Businesses today no longer use relational databases so they must use NoSQL instead of SQL to manage their data. C. NoSQL is a generic term for a DBMS that does not rely on the relational model, but instead leverages advances in data storage and computer processing technologies to meet today's data management requirements such as nonstructured data objects (documents, multimedia, and so on) and very large data sets. D. NoSQL really means "know Structured Query Language"- it is a charge to all business students to learn SQL or they will not be able to successfully work with databases in their company. E. NoSQL means that modem database management systems should implement relational databases but should not use SQL because it is out of date.

C. NoSQL is a generic term for a DBMS that does not rely on the relational model, but instead leverages advances in data storage and computer processing technologies to meet today's data management requirements such as nonstructured data objects (documents, multimedia, and so on) and very large data sets.

What is a brute force attack? A. It is any malware attack that is brutally effective. B. It is a denial of service attack. C. It is a physical break-in to a company facility for the purpose of stealing sensitive data. D. It is an attack in which a password cracker tries every possible combination of characters to break a user's password. E. It is an attack in which a criminal physically injures an employee in order to seize his or her laptop or tablet and thereby obtain sensitive company data.

D. It is an attack in which a password cracker tries every possible combination of characters to break a user's password.

Which of the following statements about remote action systems is NOT accurate? A. Remote action systems enable experts to scale their expertise. B. Remote action systems provide computer-based activity or action at a distance. C. Remote action systems make the skills and abilities of an expert available in places where he or she is not physically located. D. Remote action systems allow remote control of a computer but do not include robotic systems. E. Remote action systems save time and travel expense by enabling action at a distance.

D. Remote action systems allow remote control of a computer but do not include robotic systems.

Which of the following is NOT a characteristic of a service-oriented architecture (SOA)? A. Using SOA, programs formally define the data they expect. B. Using SOA, programs formally define the services they perform. C. Using SOA, programs formally define the results they produce. D. SOA are limited to local area networks. E. SOA is a way of designing computer programs so they can be flexibly combined for cloud processing.

D. SOA are limited to local area networks.

Which of the following is NOT one of the ways that organizations use the cloud? A. Saas (Software as a Service) B. IaaS (Infrastructure as a Service) C. CDN (Content Delivery Networks) D. Waas (Web sites as a Service) E. PaaS (Platform as a Service)

D. Waas (Web sites as a Service)

Which of the following is NOT one of the personal security safeguards that users should implement? A. Take security seriously. B. Send no valuable data via email or IM. C. Create strong passwords. D. Use multiple passwords. E. Fix any suspicious software problems by re-writing the bad source code.

E. Fix any suspicious software problems by re-writing the bad source code.

Which of the following is NOT a characteristic of future cloud-based information systems? A. More secure B. Easier-to-use C. Cheaper D. Faster E. Free

E. Free

Which of the following is NOT part of the basic concept and definition of the cloud? A. Resource access via the Internet B. Elastic leasing of resources C. Pooled computer resources D. The term cloud is used because most early diagrams of three-tier and other Internet-based systems used a cloud symbol to represent the Internet. E. Resources owned and operated by a given company

E. Resources owned and operated by a given company

Which of the following statements correctly identifies the goal of information security? A. Information security requires all employees to always use an https secure Internet connection, or else they are not allowed to connect to the Internet. B. Information security is focused strictly on securing the company's databases. C. Information security is so important to today's businesses that no expense should be spared to make the company I 00% secure. D. Information security is just about protecting physical IT assets, because if computers, servers, hard drives, and so on are all physically protected, then the company is secure overall. E. The goal of information security is to find an appropriate trade-off between the risk of loss and the cost of implementing safeguards.

E. The goal of information security is to find an appropriate trade-off between the risk of loss and the cost of implementing safeguards.

A private cloud is... A. a VPN provided by a cloud vendor B. the term used to describe Saas infrastructure C. not capable of providing elasticity benefits D. security both within and outside the owning organization's infrastructure E. a cloud that is owned and operated by an organization for its own benefit

E. a cloud that is owned and operated by an organization for its own benefit

Sources of security threats include all of the following EXCEPT A. disasters B. computer crime C. human errors and mistakes D. natural events E. the CIO's departure from the company

E. the CIO's departure from the company

Which of the following statements about metadata is incorrect? A. Metadata enables databases to be self-describing. B. Metadata resides outside of the database itself, which is why it is referred to as meta-data. C. Metadata are data that describe data. D. In Microsoft Access, field properties provide metadata. E. Metadata makes databases much more useful.

Metadata resides outside of the database itself, which is why it is referred to as meta-data.

The online site selling "everything illegal", for example guns, drugs, and stolen credit cards was called (the) ____

Silk Road

The ___ technology anonymizes internet connections by bouncing data around the globe, encrypting and re-encrypting the data until the sender cannot be traced.

Tor


संबंधित स्टडी सेट्स

NUR2261 - Unit 3 - Labor Pain/Stages and Phases of Labor

View Set

Comparing aa Function and its Inverse

View Set

Ch 2 An Introduction to Cost Data

View Set

Chapter 7- Life Insurance Underwriting and Policy Issue

View Set

Chapter 07: Legal Dimensions of Nursing Practice

View Set