MIT Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In the following file name, what are the names of the folders that contain the file? C:\user\dan\busa345\lab5.xlsx

User, dan, and busa345

Which of the following is not a top-level domain we discussed in class

.cou

Computer monitors or screens have resolutions such as 1600x900. In the laptop selection lab we saw a number of different resolutions. Which of the following has the highest resolution.

3840x2160

The smallest digital unit is a bit and we generally talk about bytes for storage. How many bits are in a byte

8

A packet is defined as

A collection of binary digits sent from computer to computer over a network

Business analytics is defined as?

Using data and statistical methods to gain insights into data and provide decision makers with information they can act on

What is the security tool the provides a secure tunnel or "pipe" through the Internet

VPN

Which of the following is not one of the four V's of big data

Validity

________ is a service that uses the internet rather than the telephone network to exchange conversations

VoIP

In class we talked about external or secondary storage. One of the devices is a SSD. It is more expensive for a comparable amount of storage in a hard drive, it has a number of advantages over the traditional hard disk drive. Which of the following is NOT one of those advantages?

Volatile

Which of the following encryption techniques provides the best security on a wireless network?

WPA2

Internet Explorer, Chrome and Firefox are examples of

Web browsers

When does a problem exist?

When there is a difference between what you have and what you expected or want

In SQL, the Where statement can be used to join tables and filter the records that are displayed. If [serial number] is a field defined as a numeric field which of the following statements will display only records where the [serial number] is 50?

Where [serial number]=50

A primary key made up of more than one field name is called a(n)?

Compound key

The textbook devotes a paragraph to a class application software referred to as CAD. What does CAD stand for

Computer Aided Design

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

Confidentiality

Local area networks (LANs) are used to ________

Connect devices in close proximity such as a building or campus

If we cannot avoid a IT risk, we can try to minimize the impact of some risks. Which of the following is the best way to protect against a power outage for a desktop computer?

Connect to a UPS device

In data communication, ______ refers to integrating voice, video, and data so that multimedia information can be used for decision making

Convergence

A ______ stores definitions such as field names, data types for fields, default values, and validation rules for data in each field

Data Dictionary

The process of converting plaintext into ciphertext is referred to as:

Data Encryption

In class we talked about a three dimensional view of data that is used for slicing and dicing. What is this view called?

Data cube

A __________ is software for creating, storing, maintaining, and accessing database files.

Database Management System

In _______, each department has its own computer for performing and controlling tasks

Decentralized processing

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

Denial of Service Attack

Which of the following statements is true of data marts and data warehouses?

Despite being smaller, data marts can usually perform the sam type of analysis as data warehouses

The video mentioned four uses for public key encryption. Which of the following is one of the four

Digital Signatures

_____ is a high speed carrier service that uses ordinary phone lines to send and receive data

Digital Subscriber Line

A website that accesses a data or DBMS back end to present up to date data is referred to as a ________ website

Dynamic or data driven

Which of the following is the process of taking data from internal and external data sources and creating a data warehouse

ETL

A transaction in which money or script is exchanged only electronically is called a(n)

Electronic payment

A(n)__________is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.

Extranet

A system has three parts. Which of the following is NOT of the parts

Feedback

_______ cables are glass tubes surrounded by concentric layers of glass, called cladding to form a light path through wire cables

Fiber optics

What is the name of the program (app) that allows you to see all the files and folders on the local computer

File explorer

Which of the following is a biometric security measure

Final recognition

Which of the following is NOT one of the three strategies identified by Michael Porter that provides organizations with competitive advantage

First to Market

In a relational model, when a primary key for one table appears as a field name in another table it is called a _____ key in the second table.

Foreign

SQL is an example of which generation of computer language? It is designed for end users

Fourth-generation language

A smartphone is a computer system really not much different than a desktop computer, only a lot smaller. Which of the following would you NOT find inside a smartphone

Hard Disk Drive

HTML has a number of capabilities, which of the following refers to embedding audio, video and images in a web page

Hypermedia

The internet provides many information services. Which of the following is not one of them?

IOS

In class we discussed the address a device has on the internet. Which of the following is the network address of a computer or printer that is attached to an Internet Protocol network

IP address

DNS (Domain Name System) servers translate all domain names into ________.

IP addresses

Signing onto a computer system is a three step process even though it feels like a single one. Which is the first step in which you let the system know who you are?

Identification

What is the third step of the seven steps of problem solving

Identify alternative solutions

______ consists of facts that have been analyzed by the process component of a system and are therefore more useful to the MIS user

Information

In class we talked about big data and data mining. The textbook discusses three types of business analytics. Which of the following is not one of them?

Informative

The last section of chapter 7 in the textbook explained the Internet of Everything. In class we talked about three types of these devices. Which of the following refers to physical objects connected to the Internet such as a microwave oven?

IoT

Which of the following best defines an operating system?

It is a set of programs for controlling and managing computer hardware and software

In class we developed a list of instructions that the robot could execute such as Rarm-90 to +180. All of these instructions are referred to as a(n)?

Language

There are two ways that data can be presented or viewed in a data base. One is based on how it is stored and retrieved, the other is how it appears to the user. Which one is the way that it appears to the user

Logical view

Which of the following is NOT a component of an information system

MIS

What router technology enables the router to communicate with multiple devices simultaneously

MU-MIMO

In class we discussed the five generations of languages. Which one is the only one that a computer understands - the native language of the computer?

Machine

There are two major types of software. Which of the following are examples of operating system software

Microsoft Windows and Linux

A ______ is a device that connects a user to the internet. Generally these devices connect DIRECTLY to a telephone line (such as AT&T with twisted pair) or a cable provider (such as Spectrum with coax cable)

Modem

How many bytes are in one gigabyte

One billion

In the lab we worked with two ways to save a file to cloud storage. Which one stores the files off campus, provides access to Microsoft Office and can be used to EASILY access file while on and off campus

OneDrive

RAM is different from Rom in that ROM is:

Optical device, nonvolatile

In lab we created reports that summarize data in Excel. The tool used to create the tables is called

Pivot tables

Which of the following is considered a non-intentional security threat

Power outages and VPN

Which of the following is an example of application software?

PowerPoint

Which types of analytics develops models from the past to predict the future or ascertain the impact of one variable on another

Predictive

In Access, the field that uniquely identifies a record in a relational database table is called a?

Primary key

Which of the following is an output device for a computer

Printer

A sequence of instructions that direct a computer to perform an action or process is called a?

Program

What button on the keyboard takes a screen shot and enables the user to copy the image of an entire screen to a document

Prt Sc or print screen

In a(n) _____, records can be accessed in any order, regardless of their physical locations in storage media

Random access file structure

There are three DBMS models, two are rarely used today. Access is which of the three types?

Relational

CD roms and DVDs are examples of

Removable devices

In the relationship diagram below from the marketing department of a small bank, what is the key field for the CS Rep table?

Rep Number

A _______ is a device that connects or joins multiple computer networks together

Router

In a relational database table the rows and columns are referred to as:

Rows are called records and columns are called field names

A ________ is an information system that enables users to retrieve web pages from the web by using keywords

Search engine

There are two different types of memory devices, primary (also called main or internal) and secondary (also called external)

Secondary memory

There are three methods for accessing files listed in the textbook. We spent a few minutes discussing two of them in detail during class. Don't confuse with the three models of a DBMS. Two of the three are?

Sequential and random

There are two basic types of database design depending on the application. One is for efficient transaction processing like the UPS example and the other is to make it easier for users to create reports. What are the two?

Speed and query

Software that secretly gathers information about users while they browse the web is referred to as?

Spyware

Which type of encryption uses the same key to encrypt and decrypt the message

Symmetric

PEST is a way to assess the environment in which an industry operates. The ability to create electronic systems that provide self driving cars and driver assist features are examples of which of the four factors

T

Which of the following best describes the difference between instant messaging and text messagin

Text messaging is a cellular service

Which of the following is one of the forces of the Five Forces Modeled by Michael Porter?

Threat of new entrants

A network _____ represents a network's physical layout

Topology

Payroll systems, accounting systems and inventory control are examples of a(n)

Transaction Processing System

You work for Enterprise Rental Cars and have to write a SQL query that joins two tables, the vehicle table and the rental table. The key field in both tables that will be used to join the two tables is: vehicle id. Which of the following is the SQL statement to join the two tables?

Where vehicle.[vehicle id]=rental.[vehicle id]

Which of the following is not one of the functions provided by the operating systems of a computer?

Word processing

In the following URL, which element is the root domain ?http://www.google.com/alpha/people.html

google

Which of the following is the correct statement to display the following data base fields: customer ID, city, state and telephone number from the customer table?

select[customerID],city ,state ,[telephone number]

You are on vacation and have 20 great photos you want to upload to Facebook for your friends to see. You are in a small rural town in Idaho that has poor Internet service. You find a coffee shop that has free Wifi and you decide to upload the files. The photos are 5 MB each. The WiFi speed is 10 Mbps (download and upload). How long do you have to sit in the coffee shop while they upload? (hint: there are 8 bits in a byte, the time is equal to the volume divided by the speed of transmission and you can use a calculator).

80 seconds

Which of the following HTML tags will display the text string in the largest size

<H1>Bellarmine University </H1>

If you copy the formula =A2+A3 from cell B10 to B11, the formula in B11 will be which of the following

=A3+A4

In the lab to select a laptop, you selected weights that corresponded to the importance of criteria and then a score for each alternative. If a weight is in cell C8 and the score is in cell D8, what is the calculation for the weighted score (assume it is not going to be copied)?

=C8*D8

Which of the following is/are a type of malware

All listed are types of malware

Excel and Facebook are examples of which type of two types of software

Application

The amount of data that can be transferred from one point to another in one second is called

Bandwidth

Which of the following is the heart of a computer (the processor) and has an arithmetic logic unit and a control unit

CPU

Which of the following is a nonbiometric security measure

Callback modems

Which of the following is a source of external data for an organization like Bellarmine?

Census or zip code data


संबंधित स्टडी सेट्स

高職龍騰英文 B3 (B版) L1 It's in Our Blood 單字&片語

View Set

Corporate Risk Management Exam 1

View Set

AM History Semester 2 Final Exam

View Set

CGDR- Child Growth and Development

View Set

Porth Pathophysiology Chapter 37: Disorders of Brain Function

View Set

Understanding Business Chapter 6

View Set

NUR 113 Ventricular Septal Defect (VSD)

View Set