cis test 2
Software that allows an organization to manage and provide access to data is a
database management system (DBMS)
SQL injection attacks are related to
databases
A(n) ________ is a collection of data organized to serve many applications efficiently.
database
The size of a nanotube is about ________ thinner than a human hair.
10,000 times
is the standard for wireless technologies
802.11
Bluetooth is another name for the ________ wireless networking standard.
802.15
A network that spans between Montana and Washington is a(n)
wide area network
is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data
xml
Regarding the IT infrastructure ecosystem, data management includes
Oracle, SQL Server, and MySQL
802.11 is also known as
Wi-Fi
Regarding IS security, DoS represents
denial of service
A(n) ________ signal is a discrete, binary waveform.
digital
are data files used to identify and protect online transactions using a trusted third party
digital certificates
MasterCard having a duplicate computer center in multiple cities is an example of ________ in case operations at one location are disrupted.
disaster recovery planning
Regarding the IT infrastructure ecosystem, SAP is an example of
enterprise software applications
A(n) ________ is the most popular method to model a database.
entity-relationship (ER) model
Competitor firms' IT services is a(n) ________ of the competitive forces model for IT infrastructure.
external part
According to Moore's Law (1965), the ratio of price to performance has
fallen
A ________ is a component in the computer system data hierarchy that includes content such as Student ID 100, Course IS 101, and Grade A.
field
A ________ is a component in the computer system data hierarchy consists of multiple records of the same type.
file
A ________ provides the link from one table to another table's primary key.
foreign key
IS security firewalls are an example of a
gatekeeper
Salesforce.com's Force.com is an example of
platform as a sevice (PaaS)
Another term for a key field is a
primary key
The field that uniquely identifies a row in a relational database table is called a
primary key
Infrastructure as a service (IaaS) provides
processing, storage, and networking resources
A positive regarding cloud computing includes
rapid elasticity
If a computer is sending a file, and a packet being sent is damaged, the ________ computer asks the ________ computer to retransmit it.
receiving; sending
Another term for a database row is a(n)
record
On a client/server system, most of the powerful processing is handled by the
server
A ________ is a program that monitors information traveling over a network and
sniffer; can be used for criminal purpose
Google Apps are an example of
software as a service (SaaS)
TCP/IP was original developed in the 1970s to support
the Department of Defense
The domain extension .mil represents
the U.S. Military
The Law of Mass Digital Storage suggests
the amount of digital information doubles each year
Public key encryption uses ________ key(s).
two
A(n) ________ uses the Internet to create a secure network connection.
virtual private network (VPN)
Setting up a system so that it is not restricted by physical configuration or geographic location is an example of
virtualization
help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.
Deep packet inspection (DPI)
Viruses differ from worms because worms
can operate on their own without attaching to other computer program files
If someone asks you to stay home and click advertising without being interested in the product or service, they may be asking you to commit
click fraud
computing emerged in 1983
client/server
computing emerged in 2000
cloud
Coaxial cable is a(n) ________ for linking network components.
connection medium
The ________ is the world's most extensive, public communication system.
internet
The world's largest network is the
internet
An Internet Protocol (IP) address
is a 32-bit number assigned to every computer on the Internet
If someone loads a program that tracks everything you type, the specific spyware is a
key logger
A small business that connects personal devices within a 500-meter radius is a(n)
local area network
The typical computing configuration in 1960 was
mainframe
includes computer viruses, worms, and Trojan horses.
malware
According to McAfee, ________ now pose the greatest security risks
mobile devices
is a widely used open source DBMS.
my SQL
A ________ links two or more computers which enable the sharing of information
network
An emerging non-relational database management system is called
noSQl
The formal process to remove data problems such as repeating groups is called
normalization
Regarding the IT infrastructure ecosystem, Microsoft Windows, Unix, and Mac OS X are examples of
operating systems platforms
Slicing digital messages into parcels is called
packet switching
A router is a communications processer used to route ________ through different networks.
packets of data
The most commonly used authentication technique used for end users is a(n)
password
Although "Big Data" doesn't refer to a specific amount of data, it usually does involve
petabytes
If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized information, they are
phishing
is defined as the shared technology resources that provide the platform for the firm's specific information systems applications.
Information technology infrastructure
EarthLink and NetZero are examples of
Internet service providers
The SQL ________ statement allows you to combine two different tables
JOIN
is the most well-known open source operating system.
Linux
In 2002, the ________ Act was passed to help protect investors with new financial statements reforms
Sarbanes-Oxley
An information systems ________ examines a firm's overall security environment and determines if the organization is properly prepared to address threats
audit
Microsoft's DBMS that includes built-in report generation and reporting is called
Access
Amazon is one of the first to provide cloud computing relational databases. This effort is called
Amazon Relational Database Service
is used to ensure the person is who he/she claims to be
Authentication
For DBMS's that do NOT include a reports generator, ________ is a popular option for large corporate DBMS.
Crystal Reports
was passed in 1996 to protect medical records.
HIPAA
is a page description language for generating Web pages (e.g., text, dynamic links).
HTML
is the most popular NoSQL DBMS
Hadoop
According to your reading, Macy's uses ________ technology to track individual items for sale on store shelves
RFID
are used to track movements of products through the supply chain.
RFID's
Microsoft's most powerful DBMS is
SQL SERVER
is a method for encrypting network traffic on the Web.
SSL
SQL stands for
Structured Query Language
services ensure that a firm's new infrastructure works with the firm's older systems and that all parts of the firm's infrastructure work together.
System integration
A ________ is a software program that mimics another program and often causes damage.
Trojan horse
A(n) ________ outlines acceptable uses of information systems assets.
acceptable use policy
A(n) ________ signal is represented by a continuous waveform that passes through a communications medium
analog
Another name for a database field is a(n)
attribute
Using your handprint to access a safe deposit box is an example of ________ authentication.
biometric
A ________ is the smallest component in the computer system data hierarchy
bit
Digital information transfer speeds are measured in
bits per second
A ________ is a component in the computer system data hierarchy that represents an ASCII character.
byte
A cloud
can be private or public
Data cleansing, working to identify and fix incorrect data, is also called
data scrubbing
The Domain Name System (DNS) converts ________ to ________.
domain names; IP addresses
Someone who intends to gain unauthorized access to a computer system is considered to be a
hacker
An IT infrastructure includes
hardware, software, and services
An intrusion detection system (IDS)
helps protect a system using full-time monitoring tools
The number of cycles per second that can be sent through a network medium is calculated in
hertz
Enterprise software applications represent a ________ industry
hundreds of billions of dollars per year
A(n) ________ is an important resource for an organization to create, illustrating rules on how data is organized and who has access to what data.
information policy
Your firm's IT strategy is a(n) ________ of the competitive forces model for IT infrastructure
internal part
Your firm's business strategy is a(n) ________ of the competitive forces model for IT infrastructure.
internal part