MIS 352 Exam 2
________ is malware that logs and transmits everything a user types.
A keylogger
To use the analog telephone system for sending digital data, you must also use
A modem
Which signal types are represented by a continuous waveform?
Analog
Microsoft SQL Server is a(n)
DBMS for midrange computers
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called
Data scrubbing
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
Data security
Which of the following statements about enterprise applications is not true?
Enterprise applications are best implemented when few changes in business processes are required.
Which of the following is not one of the top five search engines?
A database record is a grouping of characters into a word, a group of words, or a complete number.
False
A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.
False
All CRM packages contain modules for PRM and ERM.
False
Central large mainframe computing has largely replaced client/server computing.
False
Data scrubbing is a more intensive corrective process than data cleansing.
False
Implementing a Web interface for an organization's internal database usually requires substantial changes to be made to the database.
False
In associations, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.
False
Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
False
RFID technology is being gradually replaced by less costly technologies such as WSNs.
False
Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.
False
TCP/IP was developed in the 1960s to enable university scientists to locate other computers on the Internet.
False
The term cracker is used to identify a hacker whose specialty is breaking open security systems.
False
Which digital cellular standard is used widely throughout the world except the United States?
GSM
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Intrusion detection systems
A network that spans a city, and sometimes its major suburbs as well, is called a
MAN.
Smaller firms may outsource some or many security functions to
MSSPs
Which of the following is not a DBMS for midrange computers?
Microsoft Access
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
What technology allows people to have content pulled from Web sites and fed automatically to their computers?
RSS
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransomware
Data ________ occurs when the same data is duplicated in multiple files of a database.
Redundancy
A(n) ________ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.
Router
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called
SEO
________ identify the access points in a Wi-Fi network
SSIDs
Web sites that enable users to share information, collaborate, and create new services and content are called ________ sites.
Second generation
________ combine the functionality of a cell phone with the computing of a laptop.
Smartphones
Which of the following statements is not true about search engines?
There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
How do software vendors correct flaws in their software after it has been distributed?
They issue patches
A physical view shows data as it is actually organized and structured on the data storage media.
True
An application that transfers information from an organization's internal database to a Web server for delivery as part of a Web page to the user is called middleware.
True
As discussed in the chapter opening case, magnetic stripes are an old technology that is vulnerable to counterfeit and theft.
True
Before the Internet, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.
True
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
DBMS have a data definition capability to specify the structure of the content of the database.
True
Every record in a file should contain at least one key field.
True
High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
True
In 2013, Panda Security reported approximately 30 million new kinds of malware strains.
True
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
True
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
True
The organizational function that is in charge of policies and procedures for managing internal data resources is called data administration.
True
The policies and processes for managing the integrity and security of data in a firm are referred to as data governance.
True
To perform multidimensional data analysis, you would use OLAP.
True
Total supply chain costs represent the majority of operating expenses for many businesses and in some industries approach 75 percent of the total operating budget.
True
Web 3.0 is an effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information.
True
When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging.
True
You can manipulate data on a Web server by using a CGI script.
True
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
WPA2
The 802.11 set of standards is known as
Wi-Fi
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with
a crow's foot topped by a short mark.
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
access point
All of the following are types of information systems general controls except
application controls
T1 lines
are high-speed, leased data lines providing guaranteed service levels.
Customer service modules in CRM systems provide tools for
assigning and managing customer service requests.
A(n) ________ is a characteristic or quality that describes a database entity.
attribute
Biometric Authentication
can use a person's voice as a unique, measurable trait.
Hackers create a botnet by
causing other people's computers to become "zombie" PCs following a master computer
The telephone system is an example of a ________ network.
circuit-switched
Computer forensics tasks include all of the following except
collecting physical evidence on the computer.
The select operation
creates a subset consisting of all records in the file that meet stated criteria.
CRM systems help businesses obtain which business objective?
customer and supplier intimacy
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
deep-packet inspection
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
digital
Enterprise application vendors have created ________ to make their own customer relationship management, supply chain management, and enterprise systems work closely together with each other.
e-business suites
The most common type of electronic evidence is
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source for network security breaches to the firm?
employees
A firewall allows the organization to
enforce a security policy on data exchanged between its network and the Internet
Data mining is a tool for allowing users to
find hidden relationships in data.
A data warehouse is composed of
historic and current internal data.
The Sarbanes-Oxley Act
imposes responsibility on companies and management to safeguard the accuracy of financial information.
The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)
information policy
Shopping bots use ________ software for searching the Internet.
intelligent agent
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that
may be accessible by anyone who has access to the same network.
Rigorous password systems
may hinder employee productivity
Which of the following features enables a DBMS to reduce data redundancy and inconsistency?
minimizes isolated files with repeated data
Which of the following is not one of the four types of customers described in the case study on Graybar?
niche customers
Digital subscriber lines
operate over existing telephone lines to carry voice, data, and video.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
packet switching
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
peer-to-peer
A DBMS makes the
physical database available for different logical views
The logical view of a database
presents data as they would be perceived by end users.
The traditional file environment does not typically have a problem with
program-data independence
Pharming involves
redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
Which of the following is not one of the techniques used in Web mining?
server mining
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
symmetric key encryption
The communications lines in a client/server environment are specifically vulnerable to
tapping
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called
the Internet of things
Which process is used to protect transmitted data in a VPN?
tunneling
Client software in a client/server environment is specifically vulnerable to
unauthorized access
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the
upstream portion of the supply chain.
A digital certificate system
uses third-party CAs to validate a user's identity.
A(n) ________ is software for locating and managing stored Web pages.
web server
Next-generation enterprise suites use ________ and SOA to link to systems of customers and suppliers.
web services