MIS Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Artificial intelligence

Augmented and autonomous

Normal view

Edit

What can you put in data type?

Short text - alpha/numeric values

Notes pages

adding notes

One popular test of a machine's ability to think is known as the ___ test.

turing

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?

virus

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?

watson

The act of alerting the public about harmful activities that are being hidden by an organization is called:

whistleblowing

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

who you know

Router

Connect network to internet

What are the rows called?

Record

Data/Time

assigns for you!

Systems known as ___ are able to continue their operation even when problems are present.

fault-tolerant

software engineer

programmer

The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for Internet connectivity.

routers

The scam referred to as ___ (or ransomware) typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

Slide sorter view

see all slides

The ___ mode on a computer will place it in a low-power state when it is not being used.

sleep

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs

social engineering

___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems.

software engineers

Which type of malware is designed to report activity on your computer to another party?

spyware

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used

attribution

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

automation

Database Administrator (DBA)

A skilled IS professional who directs all activities related to an organization's database. Designs database

Name 6 different data types

Auto #, yes or no, short text, currency, ole object, data/time

What is BI?

Business intelligence; analyze data to predict the future

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDos

Autonumber

DON'T type anything

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks.

DRM

network administrator

Design networks

___ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.

Ethics

The ___ of a website or forum contains common questions and their responses.

FAQ

What are columns called?

Field

Datatype

Field name

What is "whole thing" called?

File or table

Which of the following is a government agency that has the capability to monitor the Internet and mobile activities of individuals?

NSA

System analyst or Data analyst

Recommend design and purchase new systems for the company

___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.

Scalable

Protocol

Set of rules or standards that must be followed by computers that wish to communicate over a network

Types of topology

Star- old(SU use) Bus- new Ring Mesh

IT jobs

Starting at 80,000

Internet

TCP/IP

Name 5 different access ojects

Table, form, reports, query, macro

Database object

Table- Collection of records Form- Screen where data can be changed/modified Report- Cannot modify or delete Query- Questions you can ask database/pre-defined questions Macro- Pre-defined programs written in database

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system

Trojan horse

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Two factor authentication

Buttons for powerpoint

Up: page up Down: page down Left: backspace Right: space

What do you use for specific data in a query

Use #

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPN

Two views when using a table design

View, data sheet

A ___ is any step you take to ward off a threat

countermeausre

Which browser feature will delete your history, cache, and cookies the moment you close the special window?

private browsing

For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them.

prosthectics

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.

telecommuting

Webpage

HTTP

Difference between Internet & Ethernet

Internet is the worlds largest network Ethernet is the standard local area network

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

acceptable use policy

The use of living organisms to manufacture new products or improve existing ones is called:

biotechnology

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

botnets

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

copyright

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.

cyberbullying

Which of the following terms refers to the technology gap between different social and economic classes?

digital divide

Which of the following statements regarding employee monitoring is FALSE?

most types of employee monitoring and internet restrictions at a workplace are illegal

The creation or manipulation of matter at the smallest possible scale is known as:

nanotechnology

Today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe.

online

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.

outsourcing

Which of the follows companies does NOT offer digital movie rentals?

pandora

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat

dust

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

fair use

Many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware.

file-sharing

Presentation slides

final view

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

Purpose of yes/no

have two values (booleam)

What is the difference between report and form?

Form is the screen that allows you to interact with database to input data, etc Report cannot modify or delete anything

___ robots are those that are created to imitate the appearance or capabilities of humans.

humaniod

Data ___ is the discovery of new patterns or relationships between data.

mining

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.

logs

Which of the following statements about recycling and reducing waste is FALSE?

most organizations have found that going paperless is worse

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

phsing

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:

piracy

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?

privacy policy

Topology

Logical layout of cables and devices that connect the nodes of the network

Primary key

Makes record so you can't duplicate everything is unique

How many characters can go in?

Up to 255

Copyright protection lasts for ___ years after the death of the author.

70


Set pelajaran terkait

Nurse Aide 1 Test 3 I, J, K, Q, R, S, T, U, V, W

View Set

Microeconomics Assignment 3 Part 3

View Set

Chapter 11 - Fundamentals of the Nervous System

View Set

Ch 41: Introduction to Anatomy and Physiology

View Set

ALL YOU NEED TO KNOW FOR CHEMISTRY

View Set

Managerial Accounting - Chapter 2

View Set