Information Systems Management Test 2
What is the difference between a DDoS attack and a DoS attack?
A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.
List characteristics of computer viruses. More than one answer may be correct.
A computer virus is software that infects computers and is created using computer code, Viruses can destroy programs or alter the operations of a computer or network.
Which of the following describe cloud computing in today's business environment? More than one answer may be correct
A majority of global companies are using the cloud to backup and store data and information, Due to the cost-effective nature of clous storage many businesses use it to back up data
The infection of a digital device by a computer virus happens in stages. What is the second step in this process?
An action such as running or opening a file activates a virus.
Why do organizations need to determine their highest priority security risk? More than on answer may be correct.
An organization may not have the resources to protect all of its data, The level of protection provided may be determined by the priority level
a technology called ____ may change the way doctors treat HIV, cancer, and antibiotic resistant bacterial infections
CRISPR
One of Google's companies that is investigating AI and machine learning is called
DeepMind
The second step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart and is written in____
English
the three-step data visualization process is comprised of which of the following
Explore data sets for patterns, create your visuals, planning for visuals
One noted disadvantage of cloud computing is the issue of over collaboration between users
False
Although not a programming language technically,___relates to the protocols that enable content to be displayed on the Internet
HTML
organ on a chip (OOC) technology allows scientists to develop drugs without animal or human testing. select the three companies that are developing OOC
Hepregen, Organovo, Nortis
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?
Trello
Although not a programming language technically,___ pertains to the protocols that enable content to be displayed on the internet
XML
improving decision making, customer service, production and operations processes are just a few of the trends in data___
analystics
The programming language of the third generation learned by most students when most computers used MS DOS was____
basic
allowing people to share a digital ledger accross a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions
blockchain
SQL is quite useful when working with large data sets and is widely used in today;s business environment. It allows the user to query that data contained in a ____
database
There are almost always errors after the code has been written. The PDLC's fourth step involves finding and correcting these errors in a process. The process is called____
debugging
Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.
descriptive analytics
An initial value process, a process and a test condition which can potentially return to the initial value is called a _____
loop
A(n)_____-oriented assesment operates well when inputs can readily be put into distinct categories or classes
object
A major trend in data analytics is the us of artificial intelligence to focus on small data which is more precise, using small datasets that are caoable of impacting decisions in the present. this is known as ____AI.
scalable
pulsed laser technology called LIDAR to detect and monitor the environment is an integral part of
self-driving trucks
while every election has its losers, one big winner in the 2016 US presidential election was ____ madia
social
How can packet sniffers, roofkits and denial-of-service (DoS) actions impact MIS systems? More than one answer may be correct.
Used with ill intent these can cause financial losses, lost productivity, and downtime, System damage can occur if plans for monitoring, detection, and remediation are not in place.
An alternative term for programming language is programming___
code
measurable and counted data that can have almost any numeric value is called___data
continuous
in the statement: SELECT * FROM Customers, the asterisk (*) indicates that the user wants to extract all the columns of data FROM the ____ table
customers
Converting a task into commands that a computer can use to perform the task is one definition of ____
programming
5g cellular technology offers the promise of download speeds as high as 20 gbps. this will likely require more antenna arrays with each antenna sending out ____ microwave signals
weaker
Select the statements that describe a conputer programmer's algorithm
written in a natural language, such as English, written in the form of a flowchart so that it will be more easily converted into a programming language
How does a Network Address Translation (NAT) type of firewall work?
It hides internal IP addresses
Which of the following are tips to avoid falling victim to a social engineering attack?
Make sure to research the facts contained in an email message, Slow down and think about the scenario. Be mindful of web searched to make sure you are landing on legitimate sites.
Describe how ransomware attacks work. More than one answer may be correct.
Ransomware is malware that makes a computer's data inaccessible until a ransom is paid, Ransomware attacks invade computers via trojan horse programs of worms, One of the most popular methods used in ransomware attacks is phishing.
data analysts must blend facts and data with knowledge about the
business or organization
A company just recieved a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?
cloud services security
Which type of colaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?
cloud-based forums, messaging, and meeting apps
Collaboration software leads to better collaboration by enabling people from across the organization and in the same time zone to share content in real time.
false
Trello is a collaboration hub that is composed if channels where teams and members of the organization can communicate, thus replacing email and making communication seamless.
false
Describe the benefits of cloud computing. More than one answer may be correct.
flexibility, cost savings, collaboration
use of data analytics include which three of the following
improved decision making, improved patient experiences and internal procedures in healthcare, improved customer service
when selecting the right data, it is important to be aware of the source of the data. for example, data is considered ____ data
third-party
Platform as a service is a cloud-based computing model where cloud service providers host the hardware and software needed for development on their own infrastructure, removing the need for developers to install this on their devices
true
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to
view, edit, and add shared information in real time, from anywhere