Cis exam 2

Ace your homework & exams now with Quizwiz!

According to Gartner, more than ________ percent of the critical data in large Fortune 1000 companies' databases are inaccurate or incomplete.

25

​________ is the standard for wireless technologies.

802.11

Bluetooth is another name for the​ ________ wireless networking standard.

802.15

​Microsoft's DBMS that includes​ built-in report generation and reporting is called​ ________.

Access

​________ is used to ensure the person is who​ he/she claims to be.

Authentication

Which of the following is a distributed database technology that enables firms and organizations to create and verify transactions on a network nearly instantaneously without a central​ authority?

Blockchain

A network that spans a college or corporate facility is called a:

CAN

​________ is the scientific​ collection, examination,​ authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

Computer forensics

___ establishes an organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.

Data governance

What is one of the main issues associated with a traditional file environment?

Data redundancy

Which of the following is not one of the top five search engines?

Facebook

In a database, a bit represents a single character, which can be a letter, a number, or another symbol.

False

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

Forecasting

​________ is the most popular NoSQL DBMS.

Hadoop

​________ was passed in 1996 to protect medical records.

Hippa

The​ ________ is the​ world's most​ extensive, public communication system.

Internet

​A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

Internet service provider

What makes a Blockchain system possible and attractive to business​ firms?

Its encryption and authentication processes make it highly secure for storing many kinds of data.

The SQL​ ________ statement allows you to combine two different tables.

JOIN

​________ includes computer​ viruses, worms, and Trojan horses.

Malware

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

An emerging​ non-relational database management system is called​ ________.

NoSQL

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open source

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet switching

​________ are used to track movements of products through the supply chain.

RFIDs

Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?

Router

All of the following are current hardware platform trends except:

SOA

which of the following is the most prominent data manipulation lancuage todau

SQL

SQL stands for​ ________.

Structured Query Language

​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent.

TCP

A​ ________ is a software program that mimics another program and often causes damage.

Trojan horse

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

True

Virtualization has become one of the principal technologies for promoting green computing.

True

Which of the following is the foundation technology for web services?

XML

The most commonly used authentication technique for end users is​ ________.

a password

Formalizing​ standards, rules, and procedures to ensure that the​ organization's general and application security controls are properly executed and enforced is​ a(n) ________ control.

administrative

​A(n) ________ signal is represented by a continuous waveform that passes through a communications medium.

analog

Another name for a database field is​ a(n) ________.

attribute

An information systems​ ________ examines a​ firm's overall security environment and determines if the organization is properly prepared to address threats.

audit

A​ ________ is the smallest component in the computer system data hierarchy.

bit

Digital information transfer speeds are measured in​ ________.

bits per second

The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

bps

A​ ________ is a component in the computer system data hierarchy that represents an ASCII character like a​ letter, a​ number, or another symbol.

byte

Viruses differ from worms because worms​ ________.

can operate on their own without attaching to other computer program files

The traditional telephone system is an example of a ________ network.

circuit-switched

A company hires a third party to click on its​ competitor's online​ ads, with no intention of learning more about the advertiser or making a purchase. This is an example of​ ________.

click fraud

Coaxial cable is​ a(n) ________ for linking network components.

connection medium

elephone and computer networks are​ ________.

converging into a single network using shared​ Internet-based standards

Data​ cleansing, working to identify and fix incorrect​ data, is also called​ ________.

data scrubbing

​A(n) ________ is a collection of data organized to serve many applications efficiently.

database

A​ ________ is software that enables an organization to centralize​ data, manage them​ efficiently, and provide access to the stored data by application programs.

database management system​ (DBMS)

SQL injection attacks are related to​ ________.

databases

A​ ________ is said to occur when hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network.

denial of service

​A(n) ________ signal is a​ discrete, binary waveform.

digital

MasterCard having a duplicate computer center in multiple cities is an example of​ ________ in case operations at one location are disrupted.

disaster recovery planning

​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the​ globe, with special​ time-keeping tools to synchronize the data and ensure the data are always consistent.

distributed

A​ ________ is a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.

domain

The Domain Name System​ (DNS) converts​ ________ to​ ________.

domain​ names; IP addresses

In-memory computing relies primarily on a computer's disk drives for data storage.

false

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A.

field

A​ ________ is a component in the computer system data hierarchy that consists of multiple records of the same type.

file

A common feild that links two differnttables ans serves as a primary key to one of these tables is calles the

foeign key

A​ ________ provides the link from one table to another​ table's primary key.

foreign key

Someone who intends to gain unauthorized access to a computer system is called a​ ________.

hacker

The number of cycles per second that can be sent through a network medium is calculated in​ ________.

hertz

​A(n) ________ is an important resource for an organization to​ create, illustrating rules on how data is organized and who has access to what data.

information policy

An Internet Protocol​ (IP) address​ ________.

is a​ 32-bit number assigned to every computer on the Internet

If someone loads a program that tracks everything you​ type, the specific spyware is​ a(n) ________.

key logger

A small business that connects personal devices within a​ 500-meter radius is​ a(n) ________.

local area network

Each computer on a network must contain which of the following?

network interface device

The formal process to remove data problems such as repeating groups is called​ ________.

normalization

The process of streamlining data to minimize redundancy and awkard many-to-many relationsjos is called

normalization

Slicing digital messages into parcels is called​ ________.

packet switching

A router is a communication processor used to pass​ ________ through different networks.

packets of data

Although​ "Big Data" does not refer to a specific amount of​ data, it usually does involve​ ________.

petabytes

If someone sends you an email trying to appear as a normal site that you commonly visit to obtain unauthorized​ information, the person is​ ________.

phishing

Another term for a key field is a​ ________.

primary key

The field that uniquely identifies a row in a relational database table is called a​ ________.

primary key

Another term for a database row is​ a(n) ________.

record

Data ________ occurs when the same data is duplicated in multiple files of a database.

redundancy

A(n) ________ represent data as two-dimensional tables.

relational DBMS

Microsoft SQL Server is a​ ________ for large mainframes and midrange computers.

relational DBMS

All of the following are technologies used to analyze and manage big data except:

relational DBMS.

In relational database table for customrs, the information about a single customer resides in a single what

row

In the realtional database, the three basic operations used to develop useful what

select, project, and join

On a​ client/server system, most of the powerful processing is handled by the​ ________.

server

All of the following are cloud computing services except:

system integration services.

T1 and T3 are international​ ________ standards for digital communication.

telephone

​TCP/IP was originally developed in the 1970s to support​ ________.

the Department of Defense

Fiber-optic cable is more expensive and harder to install than other physical transmission media.

true

The Internet is the largest implementation of client/server computing.

true

​A(n) ________ uses the Internet to create a secure network connection.

virtual private network​ (VPN)

A network that spans between Montana and Wyoming is​ a(n) ________.

wide area network

802.11 is also known as​ ________.

wifi

What types of companies have been displaced by Voice over IP​ (VoIP)?

​Long-distance telephone carriers

In​ 2002, the​ ________ Act was passed to help protect investors with new financial statements reforms.

​Sarbanes-Oxley

​________ increase(s) security by validating users through a multistep process.

​Two-factor authentication

​A(n) ________ is the most popular method to model a database.

​entity-relationship (ER) model

A​ ________ is a program that monitors information traveling over a network and​ ________.

​sniffer; can be used for criminal purposes


Related study sets

Chapter 2 Review Personal Finance

View Set

Chapter 4 Administrative Use of the Electronic Health Record

View Set

Chapter 12 (Quiz), Principles of Marketing Chapter 12 Quiz

View Set

Anatomy and Physiology Honors Exam,

View Set

Music Industry Contract Law Exam #1

View Set