Chapter 5-8 Quiz

Ace your homework & exams now with Quizwiz!

According to the information presented in this video, a spreadsheet is great to manage information about one thing but a ____ is preferred manage information about more than one thing

database

The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ______

database administration

A(n) ____ enables an organization to centrally manage and organize data

database management system

Independent computer programs that copy themselves from one computer to others over a network are called ____

worms

Regarding IS security, DoS represents ___

denial of service

Regarding the IT infrastructure ecosystem, SAP is an example of _____

enterprise software applications

A combination of hardware and software that prevents unauthorized users from accessing a network is called a______

firewall

The unique identifier for all data in a table is called the ___

primary key

A positive regarding cloud computing includes

rapid elasticity

If a computer is sending a file, and a packet being sent is damaged, the ______ computer asks the ______ computer to retransmit it

receiving; sending

Another term for a database row is a(n) _____

record

A _____ is a program that monitors information traveling over a network and ____

sniffer; can be used for criminal purposes

Google Apps are an example of ____

software as a service (SaaS)

An important element that standardizes the communication between disparate devices on the internet is ____

transmission control protocol/internet protocol

A(n) ________ is a collection of data organized to serve many applications efficiently

Database

Software that allows an organization to manage and provide access to data is a ____

Database management systems (DBMS)

The domain name system converts ______ to _____

Domain names; IP addresses

Data redundancy is the presence of _______ in multiple files

Duplicate data

________ is used to ensure the person is who he/she claims to be

authentication

If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit _____

click fraud

An internet protocol (IP) _____

is a 32-bit number assigned to every computer on the internet

A small business that connects personal devices within a 500-meter radius is a(n)_____

local area network

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are ____

phishing

The _____ is the worlds most extensive, public communication system

Internet

The Typical Computing Configuration in 1960 was ________

Mainframe

______ inclused computer viruses, works and Trojan horses

Malware

On a client/server system, most of the powerful processing is handled by the ______

Server

______ is a markup language that allows for tagging selected elements of the content of documents for their meanings an dis used for transferring data

XML

Hackers flooding a network server with many thousands of false communication request is called ______

a denial-of service attack

An information systems ____ examines a firms overall security environment and determines if the organization is properly prepared to a address threaten

audit

A(n) _____ outlines acceptable uses of information systems assets

Acceptable use policy

______ is the popular name for networking standard useful for creating small personal-area networks

Bluetooth

A grouping of characters into a word or group is called a(n)_____

Field

If you work in the health care industry, your firm will need to comply with which Act below?

HIPPA

______ is a page description language for generating web pages

HTML

Someone who intends to gain unauthorized access to a computer system is considered to be a _____

Hacker

If someone loads a program that tracks everything you type, the specific spyware is a ____

Hey logger

Every computer on the internet is assigned a unique ______

IP address

According to McAfee, ______ now pose the greatest security risk

Mobil devices

______ is a widely used open source DBMS

MySQL

Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of _______

Operating Systems platforms

Slicing digital messages into parcels is called ______

Packet switching

The field that uniquely identifies a row in a relation database table is called a _____

Primary Key

According to your reading, Macy's use _____ technology to track individuals items for sale on store shelves

RFID

______ are used to track movements of products through the supply chain

RFIDs

Microsofts most powerful DBMS is ______

SQL server

_____ is a method for encrypting network traffic on the WEb

SSL

________ converts domain names to IP addresses

The domain name system (DNS)

A _____ is a software program that mimics another program and often causes damage

Trojan horse

A(n) ____ uses the internet to create a secure network connection

Virtual private network (VPN)

To describe datasets with volumes so huge that they are beyond the ability of typical BDMS to capture, store, and analyze, the term _____ is used

big data

Data cleaning, working to identify and fix incorrect data, is also called ____

data scrubbing

According to Jacks explanation of the structure of relation database tables, which of the following statements about columns and rows is true?

each row is unique record for one of the items in the table and each column is an attribute of the item

Which below is the correct definition of "war driving"?

eavesdroppers drive by building or park outside and try to intercept wireless network traffic


Related study sets

Learning Curve 4a. Development Issues, Prenatal Development, and the Newborn

View Set

(Vera) Spanish 3 CP CULTURE FOR MIDTERM

View Set

Routers, Switches, Bridges, and Hubs

View Set

Life Insurance Policy Provisions, Options & Riders

View Set