MIS 301- Iowa State University
The IT infrastructure is____ .
- The IT personnel - The IT services - The IT components Answer: All of the above
________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging.
3G
LTE is ________ cellular technology.
4G
_________ is an attack by a programmer developing a system.
A Trojan horse
_________ is a communications control.
A firewall
_________ refers to determining who is responsible for actions that were taken.
Accountability
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed.
Accuracy
_________ causes pop-up advertisements to appear on your screen.
Adware
__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process.
BPI
_________ is the most difficult, radical, lengthy, and comprehensive strategy.
BPR
________ is a short-range wireless network.
Bluetooth
_________ organizations are purely physical.
Brick-and-mortar
_________ organizations have physical and online dimensions.
Clicks-and-mortar
________ cables are made of copper.
Coaxial
________ is a disadvantage of fiber-optic cable.
Difficult to work with
Hackers would use a botnet to perform a _________.
DoS
_________ is a remote attack requiring no user action.
DoS
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term.
False
________ cables are made of glass.
Fiber-optic
Only a few ________ satellites are needed for global coverage.
GEO
________ defines how messages are formulated and how their receivers interpret them.
HTTP
________ is NOT an advantage of twisted-pair wire.
High bandwidth
________ is an advantage of coaxial cable.
High bandwidth
Which of the following is a property issue?
How should we handle illegally copying copyrighted software?
________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
An/The ________ is a network of networks.
Internet
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets.
Internet
A network that is restricted to a single building is a ________.
LAN
Satellite telephone services are provided through ________ satellites.
LEO
________ satellites are used to run the GPS system.
MEO
________ is a broadcast medium.
Microwave
________ transmission systems transmit data through electromagnetic waves.
Microwave
_________ issues involve collecting, storing, and disseminating information about individuals.
Privacy
Which of the following is FALSE of QR codes?
QR codes are larger than bar codes because they store information both horizontally and vertically.
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
Radio
_________ means that you accept the consequences of your decisions and actions.
Responsibility
Which of the following is NOT a basic function of TCP/IP?
Responsible for disassembling, delivering, and reassembling data during transmission
______ is the most popular query language used for interacting with a database.
SQL
________ transmission systems can have a large coverage area but their signals experience propagation delay.
Satellite
________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks.
Software-defined
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services.
Spamware
_________ collects personal information about users without their consent.
Spyware
Considering the following tables, ________ is a primary key.
Student Table: ID
________ is the protocol of the Internet.
TCP/IP
A foreign key is a primary key in another file.
True
________ is a cable medium.
Twisted-pair
_________ is a private network that uses a public network to connect users.
VPN
_________ organizations are only online.
Virtual
_________ is a remote attack requiring user action.
Virus
Which of the following is NOT a characteristic of Big Data?
Viscous
The Internet is a ________.
WAN
Which of the following is the correct order of networks from largest to smallest?
WAN, MAN, LAN, PAN
Careless Internet surfing is _________ and is an _________ mistake.
a human error; unintentional
In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission.
affiliate marketing
Each characteristic or quality of a particular entity is called a(n) ________.
attribute
Which of the following is an accurate representation of the data hierarchy from smallest to largest?
bit, byte, field, record, file, database
Bandwidth is stated in ________ per second.
bits
A ________ is a group of eight ________.
byte; bits
IT____be used to create a competitive advantage____ .
can; when it is used effectively
The _________ approach highlights the interlocking relationships that underlie all societies.
common good
Which of the following is the correct order of the KMS cycle?
create, capture, refine, store, manage, disseminate
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard.
fairness
The ________ creates links between two tables.
foreign
In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time.
forward; higher
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations.
hot
An order from a customer is a(n) __________ for a business process.
input
Intellectual capital is another term for ________.
knowledge
A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department.
mart; warehouse
You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce.
mobile
Dashboards are used in which of the following processes?
monitoring process performance
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it.
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
The ________ key is an identifier field that uniquely identifies a record.
primary
With ________, customers use the internet to self-configure products or services.
product customization
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking.
public; private
Database systems minimize ________.
redundancy
In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time.
reverse; lower
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties.
rights
Each relational database table contains records (listed in _______) and attributes (listed in ______) .
rows; columns
Keystroke loggers and screen scrapers are examples of _________.
spyware
An electronic _________ is a website the represents a single store.
storefront
The ________ layer of TCP/IP provides communication and packet services.
transport
According to the textbook, ________ is the most widely available cable medium.
twisted-pair
The relational database model is based on the concept of ________-dimensional tables.
two
The _________ approach states that an ethical action is the one that provides the most good or does the least harm.
utilitarian
In ________, recipients of your marketing notices send information about your product to their friends.
viral marketing
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization.
warehouse