CIS 150 FINAL EXAM

Ace your homework & exams now with Quizwiz!

FedBid, Oracle, and Ingram are examples of ______ ecommerce

B2B B2G

Websites that sell good and services to other businesses or to the government

B2B B2G

Online store fronts that offer march and services to consumers

B2C

Which ecommerce classification encompasses consumers selling merchandise and services to each other?

B2C

Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers?

B2C

Zappos, Amazon, and Dell are examples of _____ ecommerce.

B2C

EBay and TaoBao are examples of _____ ecommerce.

C2C

consumers sell to each other at popular auction and list sites

C2C

What does CRM stand for?

Customer Relationship Management

The acronym ____________ refers to software that manages data stored in a database.

DBMS

What is an option that offers a set of development tools for creating and accessing databases when a word processor or spreadsheet isn't sufficient to handle a data set?

DBMS

software that manages data store in a database

DBMS

attacks designed to flood a web site with so much traffic that it can no longer function

DDoS

helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating models of various scenarios

DSS (Decision Support System)

In which phase of the SDLC must the project team figure out how the new system will fulfill the requirements specified in the system requirements report?

Design phase

a type of decision support system designed to provide senior managers w info relevant to strategic management activities

EIS (executive information system)

design for the army during world war !! but wasn't finished until 3 months later

ENIAC (electronic numerical integrator computer)

LAN server that is designed to look like a legitimate wifi hotspot

Evil twin

T/F: Access to databases is usually open to anyone within an organization or business.

False

T/F: In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.

False

T/F: Relational databases store unstructured data.

False

T/F: The acronym ERP stands for enterprise relationship payment.

False

What are easy-to-use DBMS's that are a good fit for small businesses and individuals?

Filemaker Pro, Microsoft Access

any computer system that processes data and provides info within a business setting

MIS

a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language

NoSQL

the level of performance a computer system provides

QoS (quality of service)

malware that arrives in a trojan disguised as legitimate software

RAT intrusion

What are the three data types? Explain.

Real - used for fields that contain numbers with decimal places integer - used for fields that contain whole numbers date - stores dates in a format that allows them to be manipulated

Why do businesses use SCM ?

SC is complex want to be efficient and profitable

collection of special command words in SQL query

SQL keywords

can operate directly on the database to carry out the user's instructions

SQL query

T/F: A decision support system derives its name from the fact that it provides the tools a decision maker needs to analyze data.

True

T/F: A major source of data for CRM is produced by loyalty programs.

True

T/F: Enterprise database applications tend to have some flexibility for customization,

True

T/F: FileMaker Pro and Microsoft Access are DBMSs.

True

T/F: In a relational database, relationships are specified by joining common data stored in records from different tables.

True

T/F: Information systems designed for a specific industry or enterprise may use vertical market software.

True

T/F: One of the major functions of an information system is to help people make decisions in response to problems.

True

T/F: SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself.

True

T/F: The goal of SCM is to supply customers with the right product at the right price.

True

T/F: The goal of normalization is to minimize data redundancy.

True

first commercially successful digital computer

UNIVAC

How can decision makers access analytical databases?

Using an executive dashboard

popular tool used to format document databases

XML

designed to verify that the new info system works as required

acceptance testing

victim is promised large amount of money in exchange for a bank account number from which a small advance fee is withdrawn

advance fee fraud

who invented the first telephone?

alexander graham bel 1876l

A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.

analytical

database that is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions

analytical database

shields certain apps against behaviors commonly exhibited by intrusions and other exploits

anti-exploit software

type of utility software that looks for and eliminates viruses of trojans, worms, and other malware

antivirus software

when internet upload speed differs from download speed

asymmetric connection

undocumented method of accessing a digital device

backdoor

the transmission capacity of a communication channel

bandwidth

top speed allowed by your plan

bandwidth cap

ISPs placing further limits on speed during peak times

bandwidth throttling

huge collections of data that are difficult to process, analyze, and manage using conventional database tools

big data

a client-server network created by hackers who gain control over several computers

botnets

network channels that are capable of moving at least two megabits of data per second

broadband

password stacking software to generate every possible combination of letters, numbers, and symbols; can run for days before password is cracked

brute force attack

What are the NoSQL technologies effective for?

building and managing non-relational databases

raw materials used by businesses to make consumer goods

capital goods

encrypted file

cipher text

process of modifying an executable file or data stream by adding more commands

code injection

What tasks do operational databases perform in relations to data?

collect and store, view, find, update, organize, distribute, move or remove

Which of the following is not a characteristic of a management information system?

collect, display, and modify transactions

medium used to transport info from one network to another

communication channel

links devices to data; info can be shared among them

communication network

virtual end point for data entering and leaving a digital device

communication port

a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula

computed field

three categories of the information industry

content computers telecommunications

examples of corrective procedures

data backups disaster recovery plans

an incident in which personal data is viewed, accessed, or retrieved without authorization

data breach

a specialized facility designed to hold and protect computer systems and data

data center

the amount of data that is duplicated in a database

data redundancy

What type of data do analytical databases store?

data that is used by corporate executives, strategic planners, and other workers to examine business metrics

specifies the way data is represented on a physical storage media and RAM

data type

a list of kets, and each ket provides a pointer to the data that contains the rest of the fields related to that key

database index

the underlying structure of a database

database model

the arrangement of fields , tables, and relationships in a database

database structure

cipher text --> plain text

decryption

antivirus software is an example of which security measure

detection activities

What is the first step in structuring a relational database?

determine what data should be collected and stored

helps hackers guess your password by stepping thru dictionary

dictionary attack

displaces an existing business process, market, industry, or product

disruptive technology

database that stores unstructured data

document oriented database

designed to deliver malicious code into a device

dropper

business transactions that are conducted electronically over a computer network

ecommerce

transforms data file so that it is hidden to unauthorized readers

encryption

any organization that seeks profit by providing goods and services

enterprise

What is ERP?

enterprise resource planning a suite of software modules that integrate major business activities

1.074 billion gigabytes

exabyte

report that contains info that is outside of normal or acceptable ranges

exception report

In a database, a(n) __________ contains the smallest unit of meaningful information

field

a template that adds the correct formatting as data is entered

field format

a specification that the database designer sets up to filter data entered into a particular field

field validation

What are the three core elements in a relational database

fields, tables, relationships

can be characterized by their use of vacuum tubes to store individual bits of data

first generation computers

one of the simplest models for storing data; consists of single, two-dimenstionable table of data elements

flat file

appeared in 1974 with the development of the first general-purpose microprocessor

fourth generation computers

software designed for common elements of many businesses

horizontal market

data type that stores URLs used to link from a database to a Web page

hyperlink

During which phase of the SDLC does the project team supervise the tasks necessary to construct the new info system

implementation phase

collects, stores, and processes data to provide useful, accurate, and timely info

information systems

system of high capacity routers and fiber optic communication links

internet backbone

the way networks fit together

internet infrastructure

creating a relationship between tables in SQL

joining tables

spyware that records keystrokes and sends them to a hacker who sifts out user passwords to access the victim's accounts

keyloggers

data type that is used for true/false and yes/no data

logical (boolean)

data type that provides a variable length field for user comments

long text

validates a field entry by checking data in an in-house or third party database

lookup routine

What is a major source of data for CRM?

loyalty programs

Which phase of the SDLC involves day to day operation of the system?

maintenance phase

any program design to surreptitiously enter a digital device

malware

circuitry that converts data carrying signals from digital device to signals that can travel over various communications channels

modem

arranges info by more than one field

multi-level sort

database that organizes relationships over three or more dimensions

multidimensional database

channels slower than 2 Mbps

narrowband

a process that helps database designers create a database structure that minimizes storage space and increases processing efficiency

normalization

database that stores data as objects, which can be grouped into classes and defined by attributes and methods

object database

Where do databases typically reside today?

on an in-house server, on a cloud based server, on distributed servers scattered throughout the world

Most modern transaction processing systems use ________ processing—a real-time method in which each transaction is processed as it is entered.

online

database that is used to collect, modify, and maintain data on a daily basis

operation database

A(n) _________ database is used to collect, modify, and maintain data on a daily basis.

operational

covers activities that make day-to-day operations run smoothly

operational planning

detailed specifications for a command

parameters

action(s) carried out by malware code

payload

what does PIECES stand for?

performance information economics control efficiency service

redirects web site traffic to fraudulent websites that distribute malware, collect personal data and other scams

pharming

obtain private information such as passwords and bankcard numbers through email scams

phishing

the order in which data are arranged on storage devices

physical sort order

file that has not yet been encrypted

plain text

A(n) _______________ is a field that contains data unique to a record.

primary key

maps the expected profitability of a product from its inception to its termination

product life cycle

languages in which one of their main capabilities is to request data from a database

query languages

locks a device and requests payment for an unlocking code

ransomware intrusion

detection activities

recognize attacks and trigger preventive countermeasures

corrective procedures

reduce the effect of an attack

deterrents

reduce the likelihood of a deliberate attack

database that stores data in a collection of relatable tables

relational database

a software tool for specifying the content and format for a database report

report generator

the outline or general specifications for a report

report template

usually begins with a virus warning and an offer to disinfect the infected device; tricks customers into clicking link and downloading malware

rogue antivirus exploit

used transistors instead of vacuum tubes

second generation computers

co-location center

several corps lease space and equipment

preventative countermeasures

shield vulnerabilities to render and attack unsuccessful

data type that is assigned to fixed length fields that hold character data

short text (access)

A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.

single level multi level

uses only one field to arrange records

single-level sort

the process of modifying a commercial app to reflect an organization's needs

software customization

the column of data that is used as the basis for rearranging the data

sort key

emphasis on long-range and future goals

strategic planning

uses a uniform format to store data for each person or thing in a file

structured file

report that combines, groups, or totals data

summary report

when upload and download speeds are the same

symmetric connection

the process of deactivating an old info system and activating a new one

system conversion

the criteria for successfully solving problems identified in an info system

system requirements

focuses on developing info systems according to the phases of an SDLC

systems analysis and design

What is SDLC?

systems development life cycle several phases of info systems

setting incremental goals that can be achieved in a year or less

tactical planning

built in 1816 using cable connected at either end to dials marked with letters of the alphabet

telegraph

transmit info over long distances without use of living carrier

telegraphy

What do DBMS's handle?

the details of how to most efficiently arrange data on a storage medium for optimal access speed

became possible in 1958, when integrated circuits were developed

third generation computers

what is the goal of the planning phase ?

to create a project development plan

What is the goal of normalization?

to minimize data redundancy

what is the goal of the analysis phase?

to produce a list of requirements for a new or revised info system

regulate current of voltage flow and act as a switch for electronic signals

transistors

computer program that seems to perform one function while actually doing something else

trojan

How are commands processed by the DBMS issued?

using computer programming languages designed for databases

How ar updates and modifications to the contents of a database field made?

using the SQL update command

an electronic device that controls the flow of electrons in a vacuum

vacuum tube

What type of software controls touchscreen order entry at fast food restaurants?

vertical

software designed for a specific industry or enterprise

vertical market

section of program code that contains a unique series of instructions known to be a part of a malware exploit

virus signature

disclosure by an employee of confidential info that relates to some danger, fraud, or other illegal connected with the workplace

whistleblowing

transport data thru wires and cables

wired channels

The planning phase of a SDLC includes all of the following except ___________.

writing a requirements report

exploits previously unknown vulnerabilities in software apps, hardware and operating system program code

zero day attack


Related study sets

What, of this Goldfish, Would You Wish?

View Set

Study Guide Ch. 17: Concepts of Care for Patients with HIV Disease

View Set

AZ Life Insurance Exam Prep Study Guide

View Set

Chapter 24: Nursing Care of the Child with an Integumentary Disorder

View Set

MGMT 421: Chapter 1, Chapter-14, MGMT 421 Chapter 13, MGMT421 Chapter 10, Chatper-9, Chapter - 8, Chapter-7, Chapter -6, MGMT 421: Chapter 8, MGMT 421: Chapter 2, MGMT421 Chapter 7, MGMT 421 chapter 15, MGMT 421: Chapter 6, MGMT 421: Chapter 5, MGMT...

View Set

Lewis-Chapter 15 - Infection and Human Immunodeficiency Virus Infection

View Set

Pharmacology Unit 9: Chapters 48-50

View Set