True/False Chap 5-6-7-8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A NOS must reside on a dedicated server computer.

F

A Web interface requires changes to the internal database.

F

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.

F

A data warehouse is typically comprised of several smaller data marts.

F

A grouping of characters into a word, a group of words, or a complete number is called a record.

F

An acceptable use policy defines the acceptable level of access to information assets for different users.

F

Application server software is responsible for locating and managing stored Web pages.

F

Autonomic computing is implemented primarily with enterprise or ISP servers.

F

Bot attacks can be prevented by using antivirus and antispyware software.

F

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

F

Client/server computing is a widely used form of centralized processing.

F

IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.

F

In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.

F

In two-tiered client/server architecture, the processing is split between two types of servers.

F

Like an ASP, a Web hosting service provides shared applications to subscribed users, but does this through a Web portal.

F

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.

F

One of the drawbacks to OODBMS are that they cannot work with applets.

F

Predictive analysis is synonymous with data mining.

F

RFID has been exceptionally popular because of its low implementation costs

F

TCO refers to the original cost of purchased technology: both hardware and software.

F

The WEP specification calls for users to create unique 40-bit encrypted passwords.

F

The most economically damaging kinds of computer crime are e-mail viruses.

F

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

F

The potential for unauthorized access is usually limited to the entry points of a network.

F

The success of the Internet is, in part, due to its design as an infinitely scalable network capable of handling millions of users.

F

Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software.

F

Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer.

F

Twisted wire can be used to connect to the Internet at speeds up to 1 Mbps

F

Viruses cannot be spread through e-mail.

F

XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.

F

A DBMS separates the logical and physical views of the data.

T

A data warehouse may be updated by a legacy system.

T

A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system.

T

A new version of the IP addressing schema being developed is called Internet Protocol version 6 (IPv6) and contains 128-bit addresses.

T

A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic.

T

An application server may reside on the same computer as a Web server or on its own dedicated computer.

T

Antivirus software can detect and eliminate viruses that are trying to enter your system.

T

Biometric authentication is the use of physical characteristics such as retinal images to provide identification.

T

Common Gateway Interface is a specification for processing data on a Web server.

T

Computer forensics experts try to recover ambient data, which are not visible to the average computer user.

T

Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines.

T

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.

T

Data cleansing is the same process as data scrubbing.

T

Data mining can be a challenge to individual privacy.

T

Digital cellular service uses several different competing standards that do not interoperate.

T

Each characteristic or quality describing a particular entity is called an attribute.

T

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.

T

Every computer on the Internet is assigned a unique Internet Protocol (IP) address.

T

Every record in a file should contain at least one key field.

T

Fault-tolerant computers contain redundant hardware, software, and power supply components.

T

Fiber-optic cable is more difficult to work with and harder to install than wire media.

T

Frame relay is less expensive than packet switching.

T

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.

T

In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points.

T

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.

T

In a client/server network, a network server sets the rule of communication for a network and provides every connected client with an address so it can be found by others on the network.

T

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.

T

Internet2 is a research network with new protocols and transmission speeds that provides an infrastructure for supporting high-bandwidth Internet applications.

T

Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses.

T

Many applications today require databases that can store and retrieve multimedia.

T

Most Wi-Fi communication uses infrastructure mode.

T

N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user.

T

NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.

T

OLAP is a key tool of BI.

T

OODBMS are slower than relational DBMS.

T

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

T

Public key encryption uses mathematically related keys.

T

SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.

T

SSL is a protocol used to secure information transfer over the Internet.

T

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

T

Sensor networks typically have a tiered architecture

T

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

T

Telephone networks are fundamentally different from computer networks.

T

The 802.11 standard can be used to provide wireless access to the Internet using a broadband connection.

T

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

T

The mainframe market has grown steadily over the past decade.

T

The operating system is used to manage the computer's activities.

T

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

T

VoIP technology uses the Internet Protocol to deliver voice information in digital form using packet switching.

T

Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.

T


संबंधित स्टडी सेट्स

Chapter 6- Planning, Strategy, and Competitive Advantage

View Set

Cvent Certification Exam Questions

View Set

Astronomy 3 Final Exam Study Guide

View Set

Chapter 21: An Emerging World Power, 1877-1914 Copy

View Set

ACC 220 final (cengage questions)

View Set