Unit 2 Test-MIS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A small business that connects personal devices within a 500meter radius is a(n) ________. A. local area network B. worldwide network C. wide area network D. binding network E. unorganized network

A

A(n) ________ uses the Internet to create a secure network connection. A. virtual private network (VPN) B. management systems private network (MSPN) C. technology private network (TPN) D. information systems private network (ISPN) E. systems private network (SPN)

A

Another term for a database row is a(n) ________. A. record B. field C. spreadsheet D. database E. attribute

A

Google Apps are an example of ________. A. software as a service (SaaS) B. platform as a service (PaaS) C. platform as a product (PaaP) D. software as a product (SaaP) E. infrastructure as a service (IaaS)

A

If someone loads a program that tracks everything you type, the specific spyware is a ________. A. key logger B. SQL injection attack C. denialofservice attack D. digital footprint E. data mining error

A

Someone who intends to gain unauthorized access to a computer system is considered to be a ________. A. hacker B. virus C. malware specialist D. compromiser E. Trojan horse

A

The typical computing configuration in 1960 was ________. A. mainframe B. client/server C. enterprise computing D. personal computer E. cloud computing

A

Which below is the correct definition of "war driving"? A.Eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic B. After gaining access to a wireless signal "lock it up" and "drive" off, leaving the access point inaccessible C. Unauthorized access to a satellite ISP D. Gaining access to a network using physical force E. Eavesdroppers physically steal a wireless network router to gain access

A

________ is a method for encrypting network traffic on the Web. A. ITLS B. XBRL C. XML D. SSL E. Http

D

A ________ is a program that monitors information traveling over a network and ________. A. sniffer; is always legitimately used B. sniffer; is never legitimately used C. dribble file; can be used for criminal purposes D. network; is always legitimately used E. sniffer; can be used for criminal purposes

E

A ________ is a software program that mimics another program and often causes damage. A. wild horse B. database C. mustang D. quarter horse E. Trojan horse

E

A positive regarding cloud computing includes ________. A. loss of control B. dependent on a vendor C. dependent on management policy D. not knowing where data is physically located E. rapid elasticity

E

A(n) ________ outlines acceptable uses of information systems assets. A. hardware policy B. phishing plan C. entityrelationship diagram D. data policy E. acceptable use policy

E

If a computer is sending a file, and a packet being sent is damaged, the ________ computer asks the ________ computer to retransmit it. A. network cable; receiving B. sending; receiving C. receiving; network cable D. receiving; enduser E. receiving; sending

E

If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit ________. A. systems analysis B. Trojan horses C. phishing D. viruses E. click fraud

E

If you work in the health care industry, your firm will need to comply with which Act below? A. P.I.P.P.A. B. GrammLeachBliley Act C. S.O.P.A. D. SarbanesOxley Act E. HIPAA

E

Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of ________. A. networking/telecommunications B. enterprise software applications C. data management D. Internet platforms E. operating systems platforms

E

The ________ is the world's most extensive, public communication system. A. Google search engine B. Intranet C. LAN D. Datanet E. Internet

E

________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data. A. Internet B. XBRL C. HTML D. Intranet E. XML

E

A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________. A. server B. switch C. firewall D. router E. hotspot

C

________ converts domain names to IP addresses. A. IP protocol B. A local area network C. A widearea network D. The domain name system (DNS) E. TCP protocol

D

A grouping of characters into a word or group of words is called a(n) ________. A. byte B. field C. record D. file E. bit

B

A(n) ________ enables an organization to centrally manage and organize data. A. cloud computer B. database management system C. laptop computer D. storage area network E. desktop computer

B

An important element that standardizes the communication between disparate devices on the Internet is _______. A. Ubuntu B. Transmission Control Protocol/Internet Protocol C. Chrome D. Novell Enterprise E. OSX Server

B

Data redundancy is the presence of ________ in multiple files. A. coarse data B. duplicate data C. fine data D. nonindexed data E. reindexed data

B

Every computer on the Internet is assigned a unique __________. A. bit identifier B. IP Address C. http address D. TCP Address E. www address

B

Regarding IS security, DoS represents ________. A. Department of Security B. denial of service C. denial of security D. date of security E. directives of security

B

The unique identifier for all data in a table is called the ________. A. foreign key B. primary key C. tuple D. columns E. candidate key

B

________ are used to track movements of products through the supply chain. A. Digital firms B. RFIDs C. Digital trackers D. System trackers E. Digital footprints

B

________ is a page description language for generating Web pages (e.g., text, dynamic links). A. Internet B. HTML C. Intranet D. XML E. XBRL

B

________ is used to ensure the person is who he/she claims to be. A. Data mining B. Authentication C. An encryption D. Knowledge management E. A production worker

B

An Internet Protocol (IP) address ________. A. is a 16bit number assigned only to servers on the Internet B. is a 32bit number assigned only to servers on the Internet C. is a 32bit number assigned to every computer on the Internet D. contains the mailing zip code of the network E. is a 16bit number assigned to every computer on the Internet

C

An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats. A. operations B. accounting C. audit D. intelligence E. data mining

C

Data cleansing, working to identify and fix incorrect data, is also called ________. A. ER diagramming B. normalization C. data scrubbing D. data chop E. data vacuum

C

Hackers flooding a network server with many thousands of false communication requests is called ________. A. an SQL injection attack B. a driveby download C. a denialofservice attack D. spoofing E. pharming

C

Slicing digital messages into parcels is called ________. A. digital footprints B. packet drops C. packet switching D. bit firms E. network binders

C

The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ________. A. data administration B. network operations C. database administration D. senior management E. data cleansing

C

The field that uniquely identifies a row in a relational database table is called a ________. A. column B. foreign key C. primary key D. data definition language E. null value

C

To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze, the term __________ is used. A. large data B. terra data C. big data D. cloud data E. relational data

C

________ includes computer viruses, worms, and Trojan horses. A. Click fraud B. Firewall C. Malware D. Security E. Wifi

C

________ is the popular name for a networking standard useful for creating small personalarea networks. A. Blacktooth B. VPN C. Bluetooth D. Voiceover IP (VOIP) E. TCP/IP

C

According to McAfee, ________ now pose the greatest security risks. A. databases B. software as a service C. email D. mobile devices E. social media

D

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ________. A. smacking B. trolling C. fishing D. phishing E. perching

D

Independent computer programs that copy themselves from one computer to others over a network are called ________. A. Storm B. viruses C. macro viruses D. worms E. Trojan horses

D

On a client/server system, most of the powerful processing is handled by the ________. A. software B. client C. input devices D. server E. data connection

D

Regarding the IT infrastructure ecosystem, SAP is an example of ________. A. operating systems platforms B. data management C. Internet platforms D. enterprise software applications E. networking/telecommunications

D

The Domain Name System (DNS) converts ________ to ________. A. IP addresses; domain names B. data; zip codes C. IP addresses; zip codes D. domain names; IP addresses E. zip codes; IP addresses

D


संबंधित स्टडी सेट्स

Chapter 25: Production and Growth

View Set

NWSCC BIO 220 Microbiology Test 4: Chapter 11-13 notes and quizzes

View Set

Learning Data Analytics Part 2: Extending and Applying Core Knowledge

View Set

PHR Study Material (covering all area)

View Set