MIS test 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

13. Which statement is true of big data?

(Big data refers to data sets that are at least a petabyte in size)

10. In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.

(create, read, update and delete)

3. An American Standard Code for Information Interchange (ASCII) file defines up to _____characters.

128

3. Data sent through a virtual private network (VPN) can be encrypted using the _____.

2 layer tunneling protocols

19. _____ bits equal one byte.

8

2. A_____ is software for creating, storing, maintaining, and accessing database files.

A DBMS

5. What is a "killer" app?

A killer application is one that becomes so essential that large numbers of people will buy a device just to run that application

2. A _____ is an organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes.

A management information system(MIS)

5. The ability of an organization to adapt operational practices to changing business environments is an indication of __________________________________.

Agility

9. Business _____ provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace.

Business Intelligence

14. ____________________ is sometimes referred to as the "father of computing."

Charles Babbage

17. Which form of text needs to be unscrambled using a decryption key?

Ciphertext.

3. A data _____ is usually a smaller version of a data warehouse, used by a single department or function.

Data marts

12. _____ analysis is used to discover patterns and relationships.

Data-mining.

13. In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools.

Database Administrator.

1. A _____ is a peripheral device for recording, storing, and retrieving information.

Disk Drive

16. _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

Green computing

9. Green computing can be achieved by:

Green computing can be achieved by using video conferencing, electronic meeting systems, and groupware. These technologies can also reduce business travel.

17. _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field, constraints, and access methods.

Integrity rules

5. In the context of intellectual property, _____ are categorized as industrial property.

Intellectual property can be divided into two categories: industrial property (inventions, trademarks, logos, industrial designs, and so on) and copyrighted material, which covers literary and artistic works.

6. In the context of information technology in workplaces, which allows adding new tasks to employees' responsibilities?

Job upgrading

1. The expectation of an increase in computer speed and capability at declining costs is the premise promoted by ___________________________________.

Moore's Law

20. A _________________ is essentially a network-connected computer dedicated to providing filebased data storage services to other network devices.

Network-attached storage (NAS).

19. __________ is a method for binding all the parties to a contact.

Nonrepudiation

18. _____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table.

Normalization

14. Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.

Pharming

5. Business analytics uses _____ to gain insight into data and provide decision makers with information they can act on.

Predictive Modeling

12. Microsoft PowerPoint is the most commonly used_____ software.

Presentation

7. In a relational database, every record must be uniquely identified by a_____ key.

Primary key

2. A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.

Program

14. Which statement is true of a flat file system?

Same data can be stored in more than one file.

17. _____ holds data when the computer is off or during the course of a program's operation.

Secondary memory.

4. In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.

Secure Sockets Layer.

16. In the context of security, _____ is an attack that takes advantage of the human element of security systems.

Social engineering

17. _____ permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews.

The Fair Use Doctrine

15. The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:

The goal of the HIPAA is to protect the confidentiality of a patient's medical information and establish safeguards to protect the privacy of health information. This includes medical providers' notes and records, health insurers' computer records, patients' billing information, as well as conversations between medical personnel concerning patient care and treatment.

11. In the context of computer literacy and information literacy, which statement is true of knowledge workers?

They should know how data should be indexed and updated.***

14. A _________________________ focuses on generating new revenue by offering new products and services to customers or increasing revenue by selling existing products and services to new customers.

Top-line Strategy

15. For the past 60 years, _____ have been applied to structured tasks such as record keeping, simple clerical operations, and inventory control.

Transaction - processing systems

11. Python is an example of a(n) _____.

a high -level programming language

8. In a relational database model, the rows are called _____.

a tuple

13. Spoofing happens when:

an illegitimate program poses as a legitimate one.

4. Computers can perform three basic tasks: _____________________, ______________________, and _______________________.

arithmetic operations, logical operations, and storage and retrieval operations.

9. In a relational database model, the columns are called _____.

attributes

5. In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.

availability.

9. In the context of intentional computer and network threats, a _____ is a programming routine built into a system by its designer or programmer to bypass system security and sneak back into the system later to access programs or files.

backdoor

7. Every character, number, or symbol on the keyboard is represented as a(n) _____ in computer memory.

binary number

18. _____ consists of a series of 0s and 1s representing data or instructions.

binary or Machine Language

12. In the context of Porter's Five Forces Model, which is a difference between buyer power and supplier power?

buyer power is high when customers have manny choices, whereas supplier power is higher when customers have fewer options

18. Which is a nonbiometric security measure?

callback modems, firewalls, and intrusion detection systems.

9. The _____is the heart of a computer.

central processor unit (CPU)

18. Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.

computer

10. E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

cookies

8. In general, _____ last the author's lifetime plus 70 years and do not need to be renewed.

copyrights

11. In the context of intellectual property, _____ is registering, selling, or using a domain name to profit from someone else's trademark.

cybersquatting

6. Computers and communication systems use _____ to represent information between computers and network systems.

data codes

16. The first step in database design is defining a _____, which determines how data is created, represented, organized, and maintained.

data model

16. _____ is an example of a secondary memory device.

data(Hard disk, Compact disc, Flash drive, etc.).

1. A _____ acts as an interface to a database, retrieving data for users and allowing users to enter

data-driven Web site

6. A(n) _____, the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.

database

8. In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

denial of service attack

10. Computer networks, database systems, point-of-sale (POS) systems, etc., are few examples of information technologies that support information systems in ____.

desicion making

4. A database administrator (DBA) is responsible for _____.

developing recovery procedures in case data is lost or corrupted.

3. A _____, identified by Michael Porter, helps organizations make their products and services distinct from their competitors.

differentiation strategy.

13. Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.

digital divide

10. When planning a comprehensive security system, the first step is designing_____, which use a combination of hardware and software for improving reliability, a way of ensuring availability incase of a system failure.

fault-tolerant systems

4. A comprehensive framework called the____ was created by Harvard Business School's Michael Porter for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive.

five forces model

11. In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

focuses on a specific area

20. In a relational database model, a _____ is a field in a relational table that matches the primary key column of another table.

foreign key

13. Java and C++ are examples of _____.

high-level languages

2. Aaron bought a photo-editing software package for personal use. The software license agreement specifies copying the software is illegal. He makes two copies of the software, to protect his investment in case the original software fails and he needs a backup. In this scenario, Aaron's action is considered _____.

illegal, but ethical

6. In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

integrity

3. Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered

legal and ethical

4. Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

legal, but unethical

16. The four Ms of resources in information systems are _____.

manpower, machinery, materials, and money.

20. Surveys have shown there to be more IT job openings than in any field except _____________________________.

medical field

19. Which is essential for information to be useful?

must be able to integrate with other data and information.

15. Which component of a data model describes methods and calculations that can be performed on data, such as updating and querying data?

operqtions

1. A_____ is an intellectual property that protects new processes.

patent

12. The main function of Cyber Incident Response Capability (CIRC) is to _____.

provide information on security incidents.

10. The Clipboard's contents are typically stored in _____.

random access memory.

7. In the context of Web and network privacy, an acceptable use policy is a:

set of rules specifying the legal and ethical use of a system and the consequences of noncompliance

8. The most common type of main memory is a semiconductor memory chip made of_____.

silicon.

14. The cost of hiring additional employees in virtual organizations is reduced because:

skills are shared among the participating companies.

11. The process of capturing and recording network traffic is referred to as _____.

sniffing

12. In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called_____.

spam

15. John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.

spoofing

6. Data warehouses are sometimes called hypercubes because they _____.

store multidimensional data

15. Identify the type of computers that has the highest storage capability.

supercomputor

7. According to Porter's Five Forces Model,____ is low when customers have more options.

supplier

17. The data component of an information system is:

the input to the system.An information system should collect data from external and internal sources. Data consists of raw facts and by itself is difficult to use for decision making.

7. In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:

the person using a credit card number is the card's legitimate owner.

20. NORA is used by both government agencies and private organizations. It is _____________________________.

the process of collecting large quantities of a variety of information and then combining it to create profiles of individuals that normally would not be obvious.

8. An information system collects past data for performance reports and current data for operational reports. This shows that the data component of the information system has a(n) _____.

time orientation

18. To minimize the invasion of privacy, users and organizations should:

use verification procedures to ensure data accuracy.

19. What is one advantage of a database over a flat file system?

uses more sophisticated security measures.

1. A(n) _____ network is often used so that remote users have a secure connection to an organization's network.

virtual private

2. Code Red, Melissa, and Sasser are examples of_____.

worms


Set pelajaran terkait

GOODQUESTIONS-Medical Surgical Nursing Chapter 12 Inflammation and Wound Healing

View Set

Medical Assistant Course 04/Medical Coding for the Career Professional

View Set

LUOA 9th Grade Girls Health and P.E. Module 6 Study Guide

View Set