CIS
DBMS have a data________ capability that is used to specify the structure of the content of the database.
definition
BYOD is one aspect of the consumerization of IT, in which new information technology first emerges in the ________ and spreads into ________.
consumer market; business organizations
Voice and data networks are ________.
converging into a single network using shared Internet-based standards
A(n) ________ is a collection of data organized to serve many applications efficiently.
database
A(n) ________ enables an organization to centrally manage and organize data.
database management system
Bluetooth is another name for the ________ wireless networking standard.
802.15
Gipsi runs a manufacturing company. She recently invested in ________ computing devices because she wanted to improve productivity by delivering information to workers without requiring them to interrupt their tasks
wearable
A network that spans between Montana and Wyoming is a(n) ________.
wide area network
Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are called ________.
wireless sensor networks
The size of a nanotube is about ________ thinner than a human hair.
10,000 times
________ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
In-memory computing
Which list below contains all the principal network types?
LAN, CAN, MAN, and WAN
What types of companies have been displaced by Voice over IP (VoIP)?
Long-distance telephone carriers
states that the number of components that a computer chip can hold doubles every two years.
Moore's Law
________ use a more flexible data model and are designed for big data.
Non-relational database management systems
A(n) ________ is the most popular method to model a database.
entity-relationship (ER) model
A record describes a(n) ________ which is a person, place, thing, or event on which we store and maintain information. Each characteristic or quality describing a particular ________ is called a(n) ________.
entity; entity; attribute
Infrastructure as a service (IaaS) provides
processing, storage, and networking resources
The coupling of files used to store information and the application program that updates and maintains those files is called ________.
program-data dependence
The decision to purchase or rent IT assets is called the ________ decision.
rent-versus-buy
A(n) ________ signal is a discrete, binary waveform.
digital
A(n) ________ is a discrete binary waveform used for transmission of data.
digital signal
All of the following are eras in IT infrastructure evolution except the
disruptive technology era
A(n) ________ is a commercially available set of software programs that eliminate the need for a firm to write its own programs for business functions.
enterprise software application
A person, place, or thing which is stored in a database is called a(n) ________.
entity
Competitor firms' IT services is a(n) ________ of the competitive forces model for IT infrastructure.
external part
According to Moore's Law (1965), the ratio of price to performance has
fallen
A grouping of characters into a word or group of words is called a(n)
field
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.
field
A ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.
file
A ________ provides the link from one table to another table's primary key.
foreign key
Salesforce's ________ provides a set of development tools and IT services that enable users to build new applications and run them in the cloud on their data center infrastructure.
platform as a service (PaaS)
All of the following are physical transmission media EXCEPT ________.
power lines
Another term for a key field is a ________.
primary key
The field that uniquely identifies a row in a relational database table is called a ________.
primary key
A _______ is a set of rules and procedures governing transmission of information between two points in a network.
protocol
A type of computer that could be in many states at once is called a
quantum computer
A positive regarding cloud computing includes
rapid elasticity
Another term for a database row is a(n) ________.
record
The most popular type of database today for PCs as well as for larger computers and mainframes is ___________ database.
relational
Microsoft SQL Server is a ________ for large mainframes and midrange computers.
relational DBMS
A communication processor used to direct packets of data through different networks is called a(n) ________.
router
The network operating system (NOS) ________.
routes network traffic
The ability of a computer, product, or system to expand to serve more users without breaking down is called ________.
scalability
On a client/server system, most of the powerful processing is handled by the _______
server
At some hospitals, doctors and nurses use ________ for hands-free access to patient records.
smart eyeware
Google Apps are an example of
software as a service (SaaS)
All of the following are total cost of ownership infrastructure components EXCEPT ________.
staff salaries
All of the following are part of the Transmission Control Protocol/Internet Protocol Reference Model EXCEPT ________.
switching layer transport application network internet layer
All of the following are wearable computing devices EXCEPT
tablet computers
T1 and T3 are international ________ standards for digital communication.
telephone
TCP/IP was originally developed in the 1970s to support ________.
the Department of Defense
Setting up a system so that it is not restricted by physical configuration or geographic location is an example of ________.
virtualization
A ________ is software that enables an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs.
DBMS
operate over existing telephone lines to carry data, voice, and video.
DSL
The corporate function that is responsible for defining and organizing the content of the database as well as database maintenance is ________.
Database administration
Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared data, serves up web pages, or manages network activities is called
client/server
A model of computing that provides a shared pool of computing resources for an organization to use over the Internet is called
cloud computing
Coaxial cable is a(n) ________ for linking network components.
connection medium
The ________ is the world's most extensive, public communication system.
internet
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
internet service provider
An Internet Protocol (IP) address ________.
is a 32-bit number assigned to every computer on the Internet
Nearly 90% percent of all PCs at the client level use which OS?
java
is an object-oriented programming language that is processor and operating system independent.
java
the SQL ________ statement allows you to combine two different tables.
join
A small business that connects personal devices within a 500-meter radius is a(n) ________. A network that spans up to 500 meters is called a ________ area network.
local area network
The typical computing configuration in 1960 was
mainframe
A network that spans a city is called a(n) ________.
metropolitan area network
Free software produced by a team of hundreds of thousands of programmers around the world is called ________.
open source software
Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of
operating systems platforms
The method of slicing digital messages into pieces, sending the pieces over different communication media, and then reassembling the pieces is called ________.
packet swirching
A router is a communications processer used to pass ________ through different networks. Slicing digital messages into parcels is called ________.
packets of data
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve ________.
petabytes
A(n) ________ is defined as the shared technology resources that provide the platform for the firm's specific information systems applications.
Information technology infrastructure
support(s) a firm's website and include(s) web hosting services, routers, and cabling or wireless equipment.
Internet platforms
What makes a Blockchain system possible and attractive to business firms?
Its encryption and authentication processes make it highly secure for storing many kinds of data.
The leading operating system on servers, mainframe computers, and supercomputers is ________.
LINUX
Which of the following is an open source operating system?
LINUX
systems are older transaction processing systems, usually created for mainframes.
Legacy
are used to reliably and securely handle huge transaction volumes, analyze huge data sets, and support large workloads in cloud data centers.
Mainframe computers
Which list below contains all the factors you can use to answer the question: How much should our firm spend on IT infrastructure?
Market demand for your firm's services, your firm's business strategy, your firm's IT strategy, infrastructure and cost, information technology assessment, competitor firm services, and competitor firm IT infrastructure investments
In relational databases, the ________ operation creates a subset of records in the file that meet stated criteria.
Select
A new family of standards developed to deal with the fact that people in remote areas do not have access to WIFI is called ________.
WiMax
is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data.
XML
Another name for a database field is a(n) ________.
attribute
Microsoft's DBMS that includes built-in report generation and reporting is called ________.
Access
To describe datasets with volumes so huge that they are beyond the ability of typical DBMS to capture, store, and analyze, the term __________ is used.
Big data
Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a peer-to-peer network nearly instantaneously without a central authority?
Blockchain
refers to a model of computing that provides access to a shared pool of computing resources over the Internet.
Cloud
Which of the following options is NOT part of the competitive forces model for IT infrastructure investment?
Current supply like your firm's services
is a lightweight operating system for cloud computing.
Google Chrome OS
Which of the following options is a page description language for generating Web pages (e.g., text, dynamic links)?
HTML
________ is the most popular NoSQL DBMS. An open source framework for parallel processing across inexpensive computers is called ________. For handling unstructured and semi-structured data in vast quantities, as well as structured data, organizations are using _____________.
Hadoop
What does HTML stand for?
Hypertext Markup Language
What agency controls the assignment of IP addresses?
ICANN
A new version of IP addressing, which contains 128-bit addresses, is called
IPv6
An emerging non-relational database management system is called ________.
NoSQL
The formal process to remove data problems such as repeating groups is called ________.
Normalization
is free software produced by a community of several hundred thousand programmers around the world.
Open source
Regarding the IT infrastructure ecosystem, data management includes
Oracle, SQL Server, and MySQL
are used to track movements of products through the supply chain. is very useful for inventory and supply chain management.
RFIDs
SQL stands for ________.
Structured Query Language
services ensure that a firm's new infrastructure works with the firm's older systems and that all parts of the firm's infrastructure work together.
System integration
________ establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent.
TCP
An important element that standardizes the communication between disparate devices on the Internet is _______.
TCP/IP
provide data, voice, and video connectivity to customers.
Telecommunication services
What does scalability refer to?
The ability of a computer, product, or system to expand to serve a large number of users without breaking down
converts domain names to IP addresses.
The domain name system (DNS)
A(n) ________ uses the Internet to create a secure network connection.
VPN
802.11 is also known as ________.
WIFI , wireless technologies
All of the following are major Internet services EXCEPT ________.
Web beacons FTP Telnet email IM
All of the following are types of information obtained from data mining EXCEPT ________.
Web beacons clustering associations classification sequences
All of the following are essential characteristics of the cloud EXCEPT
Web beacons on demand ubiquitous location-independent rapid elasticity
A set of loosely coupled software components that exchange information with one another using universal standards and languages are called ________.
Web services
The Law of Mass Digital Storage suggests that the
amount of digital information doubles each year
A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.
analog
The range of frequencies that can be accommodated on a telecommunications channel is called ________.
bandwidth
A ________ is the smallest component in the computer system data hierarchy.
bit
Digital information transfer speeds are measured in ________.
bits per second
is the popular name for a networking standard useful for creating small personal-area networks.
bluetooth
The widespread use of personal devices in the workplace and school is often referred to as ________.
bring your own device (BYOD)
A ________ is a component in the computer system data hierarchy that represents an ASCII character like a letter, a number, or another symbol.
byte
A cloud ________.
can be private or public
The process of detecting and correcting errors in a database is called ________.
data cleansing
The sales, manufacturing, and inventory systems at a bicycle manufacturer use different codes to represent bicycle frame sizes. For example, in the sales system, a large bike frame is coded with "L", while the inventory system codes a large bike frame with "LG". This situation illustrates ________.
data inconsistency
A(n) ________ is a structured survey of the accuracy and level of completeness of data in an information system.
data quality audit
Data cleansing, working to identify and fix incorrect data, is also called ________. Data cleansing, also known as _________, consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.
data scrubbing
A(n) ________ is a database that stores historic and current data for the use of decision makers in the organization.
data warehouse
A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent.
distributed
A ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.
domain
The Domain Name System (DNS) converts ________ to ________.
domain names; IP addresses
The term data ________ is used to describe the policies and processes for managing the availability, usability, integrity, and security of the data employed in an enterprise.
governance
The amount that firms worldwide are expected to spend in 2018 on ________ is $704 billion.
hardware devices
An IT infrastructure includes
hardware, software, and services
The number of cycles per second that can be sent through a network medium is calculated in ________.
hertz
All of the following are important questions about IT governance EXCEPT ________.
how data should be stored in a database
Data is considered to be ________ when the same attribute has different values.
inconsistent
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data. A(n) ________ specifies the rules of an organization for sharing and disseminating information.
information policy
Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part