True/False Chap 5-6-7-8
A NOS must reside on a dedicated server computer.
F
A Web interface requires changes to the internal database.
F
A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.
F
A data warehouse is typically comprised of several smaller data marts.
F
A grouping of characters into a word, a group of words, or a complete number is called a record.
F
An acceptable use policy defines the acceptable level of access to information assets for different users.
F
Application server software is responsible for locating and managing stored Web pages.
F
Autonomic computing is implemented primarily with enterprise or ISP servers.
F
Bot attacks can be prevented by using antivirus and antispyware software.
F
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching
F
Client/server computing is a widely used form of centralized processing.
F
IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.
F
In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.
F
In two-tiered client/server architecture, the processing is split between two types of servers.
F
Like an ASP, a Web hosting service provides shared applications to subscribed users, but does this through a Web portal.
F
OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.
F
One of the drawbacks to OODBMS are that they cannot work with applets.
F
Predictive analysis is synonymous with data mining.
F
RFID has been exceptionally popular because of its low implementation costs
F
TCO refers to the original cost of purchased technology: both hardware and software.
F
The WEP specification calls for users to create unique 40-bit encrypted passwords.
F
The most economically damaging kinds of computer crime are e-mail viruses.
F
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
F
The potential for unauthorized access is usually limited to the entry points of a network.
F
The success of the Internet is, in part, due to its design as an infinitely scalable network capable of handling millions of users.
F
Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software.
F
Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer.
F
Twisted wire can be used to connect to the Internet at speeds up to 1 Mbps
F
Viruses cannot be spread through e-mail.
F
XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.
F
A DBMS separates the logical and physical views of the data.
T
A data warehouse may be updated by a legacy system.
T
A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system.
T
A new version of the IP addressing schema being developed is called Internet Protocol version 6 (IPv6) and contains 128-bit addresses.
T
A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic.
T
An application server may reside on the same computer as a Web server or on its own dedicated computer.
T
Antivirus software can detect and eliminate viruses that are trying to enter your system.
T
Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
T
Common Gateway Interface is a specification for processing data on a Web server.
T
Computer forensics experts try to recover ambient data, which are not visible to the average computer user.
T
Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines.
T
Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource.
T
Data cleansing is the same process as data scrubbing.
T
Data mining can be a challenge to individual privacy.
T
Digital cellular service uses several different competing standards that do not interoperate.
T
Each characteristic or quality describing a particular entity is called an attribute.
T
Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.
T
Every computer on the Internet is assigned a unique Internet Protocol (IP) address.
T
Every record in a file should contain at least one key field.
T
Fault-tolerant computers contain redundant hardware, software, and power supply components.
T
Fiber-optic cable is more difficult to work with and harder to install than wire media.
T
Frame relay is less expensive than packet switching.
T
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
T
In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points.
T
In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.
T
In a client/server network, a network server sets the rule of communication for a network and provides every connected client with an address so it can be found by others on the network.
T
In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.
T
Internet2 is a research network with new protocols and transmission speeds that provides an infrastructure for supporting high-bandwidth Internet applications.
T
Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses.
T
Many applications today require databases that can store and retrieve multimedia.
T
Most Wi-Fi communication uses infrastructure mode.
T
N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user.
T
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
T
OLAP is a key tool of BI.
T
OODBMS are slower than relational DBMS.
T
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
T
Public key encryption uses mathematically related keys.
T
SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.
T
SSL is a protocol used to secure information transfer over the Internet.
T
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
T
Sensor networks typically have a tiered architecture
T
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
T
Telephone networks are fundamentally different from computer networks.
T
The 802.11 standard can be used to provide wireless access to the Internet using a broadband connection.
T
The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.
T
The mainframe market has grown steadily over the past decade.
T
The operating system is used to manage the computer's activities.
T
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
T
VoIP technology uses the Internet Protocol to deliver voice information in digital form using packet switching.
T
Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.
T