CIS 314 - Chapter 4-6 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

___________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

Which of the following is a leading networking hardware provider?

Cisco

Which of the following statements about cookies is not true?

Cookies are installed only at the user's request.

Which of the following protects the authors of a book from having their work copied by others?

Copyright law

In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources?

Data administration

Which of the following occurs when the same attribute in related data files has different values?

Data inconsistency

________________ creates confusion that hampers the creation of information systems that integrate data from different sources

Data redundancy

In a large organization, which of the following functions would be responsible for physical database design and maintenance?

Database administration

T or F: Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.

False

T or F: The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following?

Profiling

The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age?

Property rights and obligations

A SAN is a ________ _____ network.

Storage Area

T of F: You can manipulate data on a web server by using a CGI script.

True

T or F: An applications server may reside on the same computer as a web server or on its own dedicated computer.

True

T or F: Cloud computing is the fastest growing form of computing.

True

T or F: Copyright is a legal protection given to creators of certain types of intellectual property.

True

T or F: DBMS have a data definition capability to specify the structure of the content of the database.

True

T or F: In financial service firms, investments in IT infrastructure represent more than half of all capital invested.

True

T or F: Legacy systems are used to populate and update data warehouses.

True

T or F: Liability is a feature of political systems and allows individuals to recover damages done to them by others.

True

T or F: Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

True

T or F: Program data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

True

T or F: Routine violations of individual privacy are made easier by advances in data storage.

True

T or F: Scalability refers to the ability to of a computer, product, or system to expand to serve a large number of users without breaking down.

True

T or F: The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent v. buy decision.

True

T or F: a physical view shows data as it is actually organized and structured on the data storage media.

True

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources?

Virtualization

The FIP principle of Notice/Awareness states that:

Websites must disclose their information practices before collecting data.

A schematic of the entire database that describes the relationships in a database is called a(n):

entity-relationship diagram

A data warehouse of:

historic and current internal data

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):

information policy

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization

Software that manages the resources of the computer are called:

operating system software

The practice of contracting custom software development to an outside firm is commonly referred to as

outsourcing

A field identified in a table as holding the unique identifier of the table's records is called the:

primary key

A(n) __________________ represent data as two-dimensional tables.

relational DBMS

In a table for customers, the information about a single customer would reside in a single:

row

Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision?

the Golden Rule

According to the ________, you should take the action that produces the least harm.

the risk aversion principle

___________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

T of F: Multiple data marts are combined and streamlined to create a data warehouse.

False

T or F: A record is a characteristic or quality used to describe a particular entity.

False

T or F: Application server software is responsible for locating and managing stored webpages.

False

T or F: Associations are occurrences linked to multiple events.

False

T or F: Client/server computing is a primary example of centralized processing.

False

T or F: Quantum computing is implemented primarily with enterprise or ISP servers.

False

T or F: Relational DBMS use key field rules to ensure that relationships between coupled tables remain consistent.

False

T or F: SANs maintain a servers and provide fee-paying subscribers with space to maintain their websites.

False

T or F: TCO refers to the original cost of purchased technology: both hardware and software.

False

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?

HIPAA

Which of the following is not one the key technology trends that raises ethical issues?

Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve?

Information rights and obligations

______________ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard.

Multitouch

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open Source

In the _____________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected.

Opt-In

___________ grants the owner exclusive ownership of the ideas behind the invention for 20 years.

Patent

_________ means to accept the potential costs and obligations for the decisions you make.

Responsibility

Which of the following is the most prominent data manipulation language today?

SQL

Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all?

Slippery-slope Rule

Which of the following is NOT an example of the moral dimensions of the information age identified in the text?

The emergence of giant tech firms that dominate their markets

Which of the following best describes how new information systems can result in legal grey areas?

They result in new situations that are not covered by old laws.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology​ implementations?

Total cost of ownership

A characteristic or quality that describes a particular database entity is a(n):

attribute

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:

browser

All of the following are technologies used to analyze and manage big data:

cloud computing

Interpretations of Moore's law assert that:

computing power doubles every 18 months

Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:

data scrubbing


Set pelajaran terkait

Chapter 6 (401): The School Health Program: A Component of Community Health (2)

View Set

1a Eukaryotic Cells→Membrane Bound Organelle→Cytoskeleton→Tissue

View Set

Investigating Your Career- Chapter 1: Preparing Your Path to Success

View Set

Chapter 9: Organizational Structure & Design

View Set

Cultural Anthropology (10) Kinship and Descent

View Set

Ch2. Field Underwriting, Application, Premiums, Receipts

View Set