MISY 3310 Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Big Data

- generated rapidly - has a variety of data with structured data and​ free-form text and logs - data sets are at least a petabyte in size - can consist of multimedia files like​ graphics, audio, and video CANT BE PROCESSED WITH TRADITIONAL METHODS

Hadoop

- open source software framework - inspired by​ Google's system for processing huge data sets - big data problem down into​ sub-problems - combines results into a smaller data set that is easier to analyze DOESNT extracts data from multiple tables that have a relationship.

If you are creating a network using​ twisted-pair (CAT​ 5) wire, the cable​ shouldn't exceed​ ________ meter(s).

100

​___________________ is the ability to determine that a person is who he or she claims to be through a variety of means.

Authentication

Which term refers to the wireless networking standard that is popular for creating small​ personal-area networks?

Bluetooth

A​ ________ in a database represents a single character such as a letter or number.

Byte

Although it may seem innocent​ enough, ___________ is a serious problem for companies that are involved with​ pay-per-click advertising.

Click fraud

Microsoft Azure SQL is an example of a​ _________________ database.

Cloud

​________ computing is a model of computing in which computer​ processing, storage,​ software, and other services are provided as a shared pool of virtualized resources over a network.

Cloud

​________ are​ methods, policies, and organizational procedures that ensure the safety of the​ organization's assets.

Controls

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ _________________.

Cybervandalism

Which of the following involves searching for patterns and relationships among​ data?

Data mining

Taking over computers and directing those systems to overload a network is defined as a​ _____________ attack.

Denial-of-service

Network signals that are represented by​ on-off pulses indicate which type of​ signal?

Digital

Which of the following is a popular way to describe relationships​ (i.e., one-to-one,​ one-to-many) in a relational​ database?

Entity-relationship diagram

Which of the following is a critical security function of senior management in an​ organization?

Establishing the security policy and managing risk

Which of the following is NOT a function of a data​ warehouse?

Filter Data

Which of the following prevents unauthorized users from accessing private networks by using hardware and software to control the flow of network​ traffic?

Firewalls

Data​ ________ is important because it establishes an​ organization's rules for​ sharing, disseminating,​ acquiring, standardizing, and classifying data.

Governance

Which term refers to connecting geographically remote computers in a single network to create a​ "virtual supercomputer"?

Grid computing

​_______________ requires that your patient records be protected and saved for six years.

HIPAA

Which of the following is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons?

HTML5

What is the name of the organization responsible for assigning public IP​ addresses?

ICANN

The​ ________________ virus was written in Visual Basic script and transmitted as an attachment to an email.

ILOVEYOU

Which statement about the​ TCP/IP protocol is​ FALSE?

IP helps to recover any packets that are lost or damaged during transmission.

The old IP address system is being replaced by the​ ________, which can contain more than a quadrillion possible unique addresses.

IPv6

The​ ________ is an advanced networking consortium representing more than 100 countries.

Internet2

​______________________ is a general security term that includes computer​ viruses, worms, and Trojan horses.

Malware

The data​ _______________ language allows you to retrieve information from the database​ (i.e., using the​ SELECT, FROM, WHERE​ commands).

Manipulation

Which of the following is a software application that consists of interchangeable software components that integrate freely with other applications on the​ Internet?

Mashup

If you need a DBMS for large commercial use on a​ mainframe, which of the following is a viable​ option?

Microsoft SQL Server

Microsoft Windows Server and Linux are examples of​ ________.

Network operating system

Relational tables need to be​ ______________ to help avoid duplicate data.

Normalized

Which tool enables users to view the same data in different ways using multiple​ dimensions?

OLAP

An individual wanting to enable his desktop PC at home to access the Internet must do which of the​ following?

Obtain a subscription with an Internet Service Provider​ (ISP)

Which statement about public key encryption is​ FALSE?

On receiving the​ message, the recipient uses the public key to decrypt it.

Which type of software is created and updated by a worldwide community of programmers and is available for​ free?

Open source software

In cloud​ computing, why are resources considered​ pooled?

Organizations share the same physical hardware through virtualization.

The method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

Packet switching

Which term refers to products like​ Microsoft's Azure and​ Salesforce.com's Salesforce?

Platform as a service​ (PaaS)

A​ ________ is a set of rules that programs on two communicating devices follow.

Protocol

Which technology has recently been applied to inventory​ control, supply chain​ management, and the Internet of​ Things?

RFID systems

​____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system.

Ransomware

​_______________ databases are by far the most popular type of database on the market today.

Relational

Which of the following refers to the capability of a​ computer, product, or system to serve an increasing number of users without breaking​ down?

Scalability

What is the first step in effectively managing data for a​ firm?

Specify the information policy

What type of filtering provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a​ receiver?

Stateful inspection

What is the most prominent data manipulation language and method to​ "question" a​ database?

Structured Query Language

If you wanted to have wireless connectivity in your home or​ apartment, you would need​ a(n) _________________ to move packets of data to your different devices.

Switch

The Windows operating system is an example of​ ______________ software.

System

A company needing reliable digital communication service levels at speeds of 1.54 Mbps would probably need to lease a dedicated​ ________ line.

T1

Which statement about digital certificates is​ FALSE?

The CA verifies a digital certificate​ user's identity online.

Which of the following is NOT a function of the Internet service provider​ (ISP)?

The ISP provides application services.

Bandwidth is determined by calculating which of the​ following?

The difference between the highest and lowest frequency on a channel

Which statement about the Domain Name System​ (DNS) is​ FALSE?

The first name in the domain name is the organization name.

Which of the following best defines​ hertz?

The number of cycles per second that can be sent through a medium

Which of the following is NOT addressed by a business continuity​ plan?

The technical issues involved in keeping systems up and running

Which statement about​ multi-tiered (N-tier)​ client/server networks is​ TRUE?

The work of the entire network is balanced over several levels of servers.

Why are legacy systems still​ used?

They are too expensive to redesign.

Which model can be used to analyze the direct and indirect expenses to help firms determine how much they will need to spend on specific technology​ implementations?

Total cost of Ownership (TCO)

A​ _______________ is a program that seems nonthreatening but then does something completely unexpected.

Trojan jorse

The​ "3V's" used to characterize big data include​ volume, variety, and​ _______.

Velocity

Which of the following is dedicated to managing HTML​ pages?

Web server

Which of the following does NOT need to be addressed in an​ organization's information​ policy?

What the relationships inside the data are

A company needing a network to connect its offices in​ Montana, Idaho, and Utah would require a​ ________.

Wide area network

​___________ uniquely allows for​ presentation, communication, and the storage of data. It is often used to transfer data from one organization to another.

XML

Electronic evidence on computer storage media that is not visible to the average user is called​ ________.

ambient data

The signal from your iPhone earphone is​ a(n) ________ signal.

analog

​A(n) ________ signal is a way to communicate in a network and is represented by a continuous waveform.

analog

In a student​ database, a column called LastName would be an example of​ a(n) _____________.

attribute

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

biometric

A​ ________ is represented by a 0 or 1.

bit

The bring your own device​ (BYOD) movement, in which personal hardware devices become integrated into business​ organizations, is one aspect of the​ ________.

consumerization of IT

A location specified to include IT infrastructure such as​ storage, security, and system backup is called a​ ________.

data center

Software for managing business data​ (i.e., inventory) is known as​ _______________ software.

data management

A common approach of networking multiple computers as opposed to a single computer is called​ ________ processing.

distributed

In a student​ database, a collection of related attributes such as​ LastName, FirstName, and​ Student# creates​ a(n) _______________.

entity

The most common use of​ non-relational database management systems is for managing​ ________.

extremely large data sets

Contemporary PC operating systems and application software use a​ ________, which makes extensive use of​ icons, buttons,​ bars, and boxes to perform tasks.

graphical user interface

​A(n) ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers.

keylogger

If you were building a network intended to service two buildings that were next to each​ other, you would construct a​ ________.

local area network

A​ ________ is a​ large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

Compared to​ in-house hosting,​ cloud-based hosting​ ________.

minimizes the risk of investing in technology that will soon become obsolete

At its most basic​ level, a(n)​ _________ simply consists of two or more computers that are connected together.

network

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ _______________.

phishing

​A(n) __________ key uniquely identifies a row or record in a table.

primary

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of​ a(n) ______________.

record

Relational databases enforce​ ______________ integrity to​ ensure, for​ instance, that a teacher​ can't be assigned to a CLASS table unless there is already a record for that teacher in the TEACHER table.

referential

Establishing some understanding of the threats an organization faces is an example of​ a(n) _______________.

risk assessment

To manage their relationship with an​ outsourcer, firms will need​ a(n) ________ which defines the specific responsibilities of the service provider as well as the customer.

service level agreement​ (SLA)

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________.

social engineering

Lightweight portable devices such as small​ laptops, tablets, and​ smartphones, utilize​ ________ as the secondary storage technology.

solid state drives

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example of​ ________.

virtualization

The Apple Watch is a​ ________ computing device that operates on a mobile digital platform.

wearable

​A(n) __________ is a unique type of malware that replicates itself from one computer to another and does not rely on human behavior.

worm

The Internet is based on which three key​ technologies?

​Client/server computing, packet​ switching, and​ TCP/IP

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal?

​Gramm-Leach-Bliley Act

Which law provides rules related to the creation of financial statements to help avoid​ fraud?

​Sarbanes-Oxley Act

A method that allows complex business calculations to be performed on very large data sets in seconds is termed​ __________ computing.

​in-memory

Education being represented by .edu and business represented by .com are examples of​ ________.

​top-level domains


Set pelajaran terkait

PSYCH 104 - CH6 Probability, Normal Distributions, and z Scores TERMS

View Set

PATHOPHYSIOLOGY Ch. 17 & Ch 18 prepu

View Set

Business Law Chapter 8 (Property Rights)

View Set

Pharmacology ATI study questions part 17

View Set

Medical affixes - Terminology test 4

View Set