MIT Final Exam
In the following file name, what are the names of the folders that contain the file? C:\user\dan\busa345\lab5.xlsx
User, dan, and busa345
Which of the following is not a top-level domain we discussed in class
.cou
Computer monitors or screens have resolutions such as 1600x900. In the laptop selection lab we saw a number of different resolutions. Which of the following has the highest resolution.
3840x2160
The smallest digital unit is a bit and we generally talk about bytes for storage. How many bits are in a byte
8
A packet is defined as
A collection of binary digits sent from computer to computer over a network
Business analytics is defined as?
Using data and statistical methods to gain insights into data and provide decision makers with information they can act on
What is the security tool the provides a secure tunnel or "pipe" through the Internet
VPN
Which of the following is not one of the four V's of big data
Validity
________ is a service that uses the internet rather than the telephone network to exchange conversations
VoIP
In class we talked about external or secondary storage. One of the devices is a SSD. It is more expensive for a comparable amount of storage in a hard drive, it has a number of advantages over the traditional hard disk drive. Which of the following is NOT one of those advantages?
Volatile
Which of the following encryption techniques provides the best security on a wireless network?
WPA2
Internet Explorer, Chrome and Firefox are examples of
Web browsers
When does a problem exist?
When there is a difference between what you have and what you expected or want
In SQL, the Where statement can be used to join tables and filter the records that are displayed. If [serial number] is a field defined as a numeric field which of the following statements will display only records where the [serial number] is 50?
Where [serial number]=50
A primary key made up of more than one field name is called a(n)?
Compound key
The textbook devotes a paragraph to a class application software referred to as CAD. What does CAD stand for
Computer Aided Design
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
Confidentiality
Local area networks (LANs) are used to ________
Connect devices in close proximity such as a building or campus
If we cannot avoid a IT risk, we can try to minimize the impact of some risks. Which of the following is the best way to protect against a power outage for a desktop computer?
Connect to a UPS device
In data communication, ______ refers to integrating voice, video, and data so that multimedia information can be used for decision making
Convergence
A ______ stores definitions such as field names, data types for fields, default values, and validation rules for data in each field
Data Dictionary
The process of converting plaintext into ciphertext is referred to as:
Data Encryption
In class we talked about a three dimensional view of data that is used for slicing and dicing. What is this view called?
Data cube
A __________ is software for creating, storing, maintaining, and accessing database files.
Database Management System
In _______, each department has its own computer for performing and controlling tasks
Decentralized processing
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
Denial of Service Attack
Which of the following statements is true of data marts and data warehouses?
Despite being smaller, data marts can usually perform the sam type of analysis as data warehouses
The video mentioned four uses for public key encryption. Which of the following is one of the four
Digital Signatures
_____ is a high speed carrier service that uses ordinary phone lines to send and receive data
Digital Subscriber Line
A website that accesses a data or DBMS back end to present up to date data is referred to as a ________ website
Dynamic or data driven
Which of the following is the process of taking data from internal and external data sources and creating a data warehouse
ETL
A transaction in which money or script is exchanged only electronically is called a(n)
Electronic payment
A(n)__________is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.
Extranet
A system has three parts. Which of the following is NOT of the parts
Feedback
_______ cables are glass tubes surrounded by concentric layers of glass, called cladding to form a light path through wire cables
Fiber optics
What is the name of the program (app) that allows you to see all the files and folders on the local computer
File explorer
Which of the following is a biometric security measure
Final recognition
Which of the following is NOT one of the three strategies identified by Michael Porter that provides organizations with competitive advantage
First to Market
In a relational model, when a primary key for one table appears as a field name in another table it is called a _____ key in the second table.
Foreign
SQL is an example of which generation of computer language? It is designed for end users
Fourth-generation language
A smartphone is a computer system really not much different than a desktop computer, only a lot smaller. Which of the following would you NOT find inside a smartphone
Hard Disk Drive
HTML has a number of capabilities, which of the following refers to embedding audio, video and images in a web page
Hypermedia
The internet provides many information services. Which of the following is not one of them?
IOS
In class we discussed the address a device has on the internet. Which of the following is the network address of a computer or printer that is attached to an Internet Protocol network
IP address
DNS (Domain Name System) servers translate all domain names into ________.
IP addresses
Signing onto a computer system is a three step process even though it feels like a single one. Which is the first step in which you let the system know who you are?
Identification
What is the third step of the seven steps of problem solving
Identify alternative solutions
______ consists of facts that have been analyzed by the process component of a system and are therefore more useful to the MIS user
Information
In class we talked about big data and data mining. The textbook discusses three types of business analytics. Which of the following is not one of them?
Informative
The last section of chapter 7 in the textbook explained the Internet of Everything. In class we talked about three types of these devices. Which of the following refers to physical objects connected to the Internet such as a microwave oven?
IoT
Which of the following best defines an operating system?
It is a set of programs for controlling and managing computer hardware and software
In class we developed a list of instructions that the robot could execute such as Rarm-90 to +180. All of these instructions are referred to as a(n)?
Language
There are two ways that data can be presented or viewed in a data base. One is based on how it is stored and retrieved, the other is how it appears to the user. Which one is the way that it appears to the user
Logical view
Which of the following is NOT a component of an information system
MIS
What router technology enables the router to communicate with multiple devices simultaneously
MU-MIMO
In class we discussed the five generations of languages. Which one is the only one that a computer understands - the native language of the computer?
Machine
There are two major types of software. Which of the following are examples of operating system software
Microsoft Windows and Linux
A ______ is a device that connects a user to the internet. Generally these devices connect DIRECTLY to a telephone line (such as AT&T with twisted pair) or a cable provider (such as Spectrum with coax cable)
Modem
How many bytes are in one gigabyte
One billion
In the lab we worked with two ways to save a file to cloud storage. Which one stores the files off campus, provides access to Microsoft Office and can be used to EASILY access file while on and off campus
OneDrive
RAM is different from Rom in that ROM is:
Optical device, nonvolatile
In lab we created reports that summarize data in Excel. The tool used to create the tables is called
Pivot tables
Which of the following is considered a non-intentional security threat
Power outages and VPN
Which of the following is an example of application software?
PowerPoint
Which types of analytics develops models from the past to predict the future or ascertain the impact of one variable on another
Predictive
In Access, the field that uniquely identifies a record in a relational database table is called a?
Primary key
Which of the following is an output device for a computer
Printer
A sequence of instructions that direct a computer to perform an action or process is called a?
Program
What button on the keyboard takes a screen shot and enables the user to copy the image of an entire screen to a document
Prt Sc or print screen
In a(n) _____, records can be accessed in any order, regardless of their physical locations in storage media
Random access file structure
There are three DBMS models, two are rarely used today. Access is which of the three types?
Relational
CD roms and DVDs are examples of
Removable devices
In the relationship diagram below from the marketing department of a small bank, what is the key field for the CS Rep table?
Rep Number
A _______ is a device that connects or joins multiple computer networks together
Router
In a relational database table the rows and columns are referred to as:
Rows are called records and columns are called field names
A ________ is an information system that enables users to retrieve web pages from the web by using keywords
Search engine
There are two different types of memory devices, primary (also called main or internal) and secondary (also called external)
Secondary memory
There are three methods for accessing files listed in the textbook. We spent a few minutes discussing two of them in detail during class. Don't confuse with the three models of a DBMS. Two of the three are?
Sequential and random
There are two basic types of database design depending on the application. One is for efficient transaction processing like the UPS example and the other is to make it easier for users to create reports. What are the two?
Speed and query
Software that secretly gathers information about users while they browse the web is referred to as?
Spyware
Which type of encryption uses the same key to encrypt and decrypt the message
Symmetric
PEST is a way to assess the environment in which an industry operates. The ability to create electronic systems that provide self driving cars and driver assist features are examples of which of the four factors
T
Which of the following best describes the difference between instant messaging and text messagin
Text messaging is a cellular service
Which of the following is one of the forces of the Five Forces Modeled by Michael Porter?
Threat of new entrants
A network _____ represents a network's physical layout
Topology
Payroll systems, accounting systems and inventory control are examples of a(n)
Transaction Processing System
You work for Enterprise Rental Cars and have to write a SQL query that joins two tables, the vehicle table and the rental table. The key field in both tables that will be used to join the two tables is: vehicle id. Which of the following is the SQL statement to join the two tables?
Where vehicle.[vehicle id]=rental.[vehicle id]
Which of the following is not one of the functions provided by the operating systems of a computer?
Word processing
In the following URL, which element is the root domain ?http://www.google.com/alpha/people.html
Which of the following is the correct statement to display the following data base fields: customer ID, city, state and telephone number from the customer table?
select[customerID],city ,state ,[telephone number]
You are on vacation and have 20 great photos you want to upload to Facebook for your friends to see. You are in a small rural town in Idaho that has poor Internet service. You find a coffee shop that has free Wifi and you decide to upload the files. The photos are 5 MB each. The WiFi speed is 10 Mbps (download and upload). How long do you have to sit in the coffee shop while they upload? (hint: there are 8 bits in a byte, the time is equal to the volume divided by the speed of transmission and you can use a calculator).
80 seconds
Which of the following HTML tags will display the text string in the largest size
<H1>Bellarmine University </H1>
If you copy the formula =A2+A3 from cell B10 to B11, the formula in B11 will be which of the following
=A3+A4
In the lab to select a laptop, you selected weights that corresponded to the importance of criteria and then a score for each alternative. If a weight is in cell C8 and the score is in cell D8, what is the calculation for the weighted score (assume it is not going to be copied)?
=C8*D8
Which of the following is/are a type of malware
All listed are types of malware
Excel and Facebook are examples of which type of two types of software
Application
The amount of data that can be transferred from one point to another in one second is called
Bandwidth
Which of the following is the heart of a computer (the processor) and has an arithmetic logic unit and a control unit
CPU
Which of the following is a nonbiometric security measure
Callback modems
Which of the following is a source of external data for an organization like Bellarmine?
Census or zip code data