CBIS Quizzes 1 - 7 for Exam 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to Adam Smith, what are three ways that businesses can make labor more efficient?

- They can have workers specialize in a single, simple task - They can reduce the distance between manufacturing steps or facilities - They can invent machines to multiply the productivity of workers

The top-level domain that identifies higher education insitutions is

.edu

Binary language consists of two digits, ________ and ________.

0 ; 1

Data centralization means that data is centralized in ________ place(s).

1

According to our lecture, the average ransom demand in a ransomware situation is what % of a company's global revenue?

1 to 1.5%

ut the following in order from smallest to largest.

1. Bit 2. Byte 3. Kilobyte 4. Megabyte 5. Gigabyte 6. Terabyte 7. Petabyte

The boot process consists of how many steps.

4 steps: 1. device is turned on—BIOS runs, 2. Power-On Self-Test is executed, 3. OS is loaded into RAM, 4. OS checks the registry and loads saved configuration settings.

What idea or concept does Adam Smith propose in his Invisible Hand theory?

A free, unregulated market operates better than one in which the government controls the business activities of individuals and companies. -Smith's Invisible Hand theory argues for a laissez-faire (hands-off) approach to markets and a free enterprise system in which individuals and companies can conduct their business however they see fit.

A configuration management database is:

A repository for detailed tracking and management information regarding IT components in your work environment.

How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?

Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive. - Cloud computing eliminates the need to store data, files, and software on a device. Organizations use cloud services to internally run and maintain data centers and software applications.

In the plans for the state-wide education network, also known as the SEN, these facilities are intended to be used as vendor neutral collocation sites to help bring competitive network providers to distributed areas of the State.

Colleges and Universities

The acronym for a database administrator is ________.

DBA

The resource that leverages one-way television broadcast networks to provide classroom content to students at home.

Datacasting

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

Decision support system - Decision support systems are designed to help mid-level managers make decisions when there are a large number of inputs that change rapidly.

According to our lecture, this computer brand was the top seller in the U.S. in 2019.

Dell

When you restructure data in a relational database in a way that makes it better formatted for reporting, it is called _______________.

Denormalization

In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for

Distributed Denial of Service

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

Dos (Denial-of-Service)

What is the term that involves a Ransomer releasing private information collected during a ransom attack?

Doxing

The regulatory organization that accredits registrars who sell domain names.

Internet Corporation for Assigned Names and Numbers

Which of the following cloud based mobile device management solutions was designed to support both Apple and PCs best?

Intune

How does a firewall work?

It determines what internet traffic and leave or enter a network or computer

How is metadata related to information?

It helps clarify the nature of the information.

How are managers' jobs expected to change as management information system (MIS) technology and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools. - Managers are already able to save time by using online services to do a background check of a potential hire, for example, and by having employees use collaboration tools to schedule their own working hours or meetings.

What security control is referred to as something you have and something you know?

Multifactor authentication

According to Matt Langione's Ted Talk on the promise of quantum computers, quantum computing differs from classic computing in that quantum computing:

Operates probabilistcally and simultaneously.

What did Peter Drucker mean by "decentralization"?

Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage. - In recommending decentralization, Drucker, known for saying "Do what you do best and outsource the rest," meant that organizations should focus on business where they have an advantage and outsource the business where they do not.

In our Pizza as a Service example, pizza delivered equates to ______

Platform as a Service

The type of storage that retains data and information when the power is turned off is called

ROM (Read Only Memory)

This New Mexico legislation amended the definition of Education Technology infrastructure to include remote learning.

Senate Bill 144

How do breach and attack simulation technologies help white-hat hackers test security?

They execute thousands of attack techniques continuously to reveal weaknesses.

Which statement best describes the impact of management information systems (MIS) for communication?

They have vastly improved organizations' ability to communicate effectively and efficiently. - MIS help organizations manage and effectively use a range of communication technologies that save time and increase productivity; they can also improve communication by providing useful data about the organization's communication efforts.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan

What is the key role of a client-server network in business?

To provide personal computer users secured access to shared data.

True or False: The four components of Information Technology are People, Process, Technology and Data.

True

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

From our class discussion, we learned that one major reason that Wi-Fi connectivity requires special attention at UNM is:

Wi-Fi signals do not travel well through the adobe walls that are a major part of our campus architecture.

The organization that makes best practice recommendations to make the web "available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability" is

World Wide Web Consortium (W3C)

UNM's open data site at opendata.unm.edu uses this type of database architecture to deliver data sets for application development or use in websites.

XML

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.

all-in-one

An enterprise resource planning (ERP) system is

an integrated MIS system for agility and a competitive edge.

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

analyzing

A common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person. -This condition or limitation often means that employees are unable to use flextime if they cannot schedule around in-person work events, but it helps ensure that the employer is not harmed by the policy.

A videoconference may be a better choice than a voice conference call because it allows

better communication through nonverbal cues.

Frederick Taylor used time-and-motion studies to

break down work tasks to find ways to improve them.

A channel over which information flows inside a digital device is called a

bus

The ________ speed of the processor dictates the number of instructions that CPU can process per second.

clock

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers.

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

A computer network must be connected to the Internet to support

communicating via email with people on other networks. -Communicating with people who are not on your network via email is impossible without an Internet connection.

A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.

cybercrime

A search engine continually adjusts its algorithms as more data enter its servers. This is an example of the use of

data analytics

When creating a database field, we set ________ for each field to decrease data input mistakes.

data types

A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________.

datacenter

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks. - The application layer of TCP/IP defines or specifies how data and information are exchanged by the group of applications (such as email and messaging apps) that require network communication and are used by people to facilitate communication.

The correct way to measure the screen size of a computer monitor is?

diagonally from one corner to the other

Data redundancy is the ________ of data.

duplication

Repeat: The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format.

The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format. - The IPv6 format can accommodate at least 340 undecillion addresses, compared to the 4 billion addresses possible with IPv4.

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)

keystroke logger

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency

Relational databases use ________ called relationships between tables.

links

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

To set a primary key field in a database table, you must click the ________ key button.

primary

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location - A proximity location is when a GIS finds a specified target within a defined area. Siena searching for a gas station within five miles of the route she is currently traveling on is an example of a proximity location.

A ________ is also known as a question. A request for information from a database.

query

One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called

ransomware

In a relational database, information is organized into tables in which each row represents a(n) ________.

record

Specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

Sharing infected files and opening an infected email attachment are ways digital device users

spread computer viruses

Mary Parker Follett's theory of management is based on the principle that

success depends on the flow of ideas from all levels of an organization.

Relational databases organize data into ________ based on structured data groupings.

tables

What is the purpose of social engineering in conjunction with ransomware?

tricks victims into allowing access to data

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan

The unique global address for a web page or other resource on the Internet is called the

uniform resource locator

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?

white-hat hackers

Per our lecture, "Living at Work" is reflective of:

Additional challenges in balancing your work life and your family life.

UNM manages this aggregation site for high speed, low cost network services that takes advantage of peering services in the state, and with consortiums such as WRN and Internet 2.

Albuquerque Gigapop

Which of the following are examples of spear phishing?

An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device. - Spear phishing is email attacks that are targeted to specific people or companies and designed to steal data and possibly install malicious software on a user's device.

A wireless short-range transmission protocol is called

Bluetooth

An environment where users tend to have different computers, tablets, and other network-connected devices, that don't have the same standards or capabilities, is known as:

Bring Your Own Device

The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?

CRUD

UNM's supercomputer is called

Center for Advanced Research Computing

Repeated: What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive.

The property of a cloud to grow or shrink capacity for CPU, memory, and storage resources to adapt to the changing demands of an organization, managing both resource need and controlling cost, is known as:

Elasticity

The head of the IT department in the 1960's, 70's, and part of the 80's, when mainframe computers were the primary technology in a business.

Electronic Data Processing Manager

According to our lecture, the number 1 cause of malware infections, accounting for an alarming 45% of infections, is what?

Email Phishing

According to our lecture, a business will fall victim to ransomware how often in 2021?

Every 11 seconds

True or False: The chief information security officer heads the IT department in most organizations.

FALSE The Chief Information Security Officer (CISO) is focused on the information security posture of an organization, while the Chief Information Officer (CIO) heads the IT department. The CISO will often report to the CIO, although it is also popular to have the CISO report to the President or another senior executive leadership role.

In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________.

Foreign Key

The ________ is a separate processor (computer) on your computer that enhances your video.

Graphic processor (GPU)

Which chip and manufacturing company is the largest in the world?

Intel

The single, front door to IT services is known in ITIL as the

Service Desk

A key advantage to using an enterprise grade computer versus a consumer grade computer is:

Standard parts/components

What does the abbreviation SQL stand for?

Structured Query Language

What is the only way to guarantee that computers and networks are safe from cyberattacks?

Take them offline. - This is not a practical solution, but cyberattacks are staged from the Internet and cannot occur if the computer or network is inaccessible.

Which of the following statements most clearly describes Mary Parker Follett's contribution to management theory?

The most important elements of an organization are relationships, informal processes, and communications.

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery. -Because critical data and software is stored offsite, and not locally on individual servers and computers, data backup and recovery are easier and more efficient when organizations employ cloud computing.


Set pelajaran terkait

Cold War timeline of essential dates

View Set

The 6 Compromises of the Constitution

View Set

Data Structures Exam 1 Review Quesitons

View Set

Chapter 21- Monetary and fiscal policy

View Set