IMS Exam 2
________ is spyware that logs and transmits everything a user types.
A keylogger
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A. wireless router B. wireless sensor C. hot spot D. access point
Access Point
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?
Airport Code
Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?
Application Server
What are the four layers of the TCP/IP (transmission control protocol/internet protocol) reference model? A) Physical, application, transport, and network interface B) Physical, Application, Internet, and Network Interface C) Application, Transport, Internet, and Network Interface D) Application, Hardware, Internet, and Network Interface E) Software, Hardware, Network Interface, Internet
Application, Transport, Internet, and Network Interface
All of the following are physical components of an RFID (radio frequency id) system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.
Bar Codes
All of the following are currently being used as traits that can be profiled by biometric authentication except retinal images. facial characteristics. voice. fingerprints. body odor.
Body Odor
Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL
C) SQL
Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? A) Cost per lead B) Cost per sale C) Churn rate D) CLTV
CLTV
The join operation A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view. D) is used to combine indexing operations
Causes two tables with a common domain to be combined into a single table or view
The total time it takes to complete a business process, from start to finish, is called its ________ time. fulfillment service cycle actualization development
Cycle
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. phishing botnet SQL injection DoS DDoS
DDos
What service converts natural language names to IP addresses?
DNS (Domain Name Systems)
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data table
Data Dictionary
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name
Data inconsistency
In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration C) Information policy administration D) Data auditing E) Database management
Database administration
Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP
HTTP
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast
Identity Sequences
When hackers gain access to a database containing your personal private information, this is an example of
Identity Theft
Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A) Logging transactions B) Managing the supply chain C) Lowering network costs D) Enabling client communication E) Improving employee engagement
Managing the Supply Change
Which of the following is a DBMS (database management system)for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange
Microsoft Access
The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.
Network Service Products
A field identified in a table as holding the unique identifier of the table's records is called the
Primary Key
Which type of application does Macy's use to track items for sale on store shelves?
RFID (radio frequency id)
Which of the following pulls content from websites and feeds it automatically to users' computers? A) FTP (file transfer protocol) B) RSS (rich site summary) C) HTTP (Hypertext transfer protocol) D) Bluetooth E) IPv6
RSS (Rich Site Summary)
A(n) ________ represent data as two-dimensional tables.
Relational DBMS
Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?
Router
Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?
Safety stock
An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks for personal information is an example of:
Spear Phishing
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called
Supply Chain
On which of the following protocols is the Internet based? A) TCP/IP (transmission control protocol/Internet protocol) B) FTP (File Transfer Protocol) C) IMAP (Internet Message Access Protocol) D) HTTP (hypertext transfer protocol) E) DNS (domain Name system)
TCP/IPB
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
The internet of things
Which process is used to protect transmitted data in a VPN (virtual private network)? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining
Tunneling
Which of the following statements about Internet security is not true. A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.
VoIP is more secure than the switched voice network.
Two-factor authentication utilizes a(n): a digital certificate. a firewall. unique password. a multistep process of authentication. encrypted connection.
a multistep process of authentication.
A characteristic or quality that describes a particular database entity is called a(n): A) field. B) tuple. C) key field. D) attribute. E) relationship.
attribute
A database ________ describes a database entity.
attribute
Enterprise software is built around thousands of predefined business processes that reflect industry goals. cutting edge workflow analyses. the firm's culture. the firm's organization. best practices.
best practices
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
bull whip
IPv6 has been developed in order to
create more IP addresses
A foreign country attempting to access government networks in order to disable a national power grid would be an example of denial-of-service attacks. cyberwarfare. cyberterrorism. evil twins. phishing.
cyberwarfare
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
data scrubbing.
A(n) ________signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0- bits.
digital
Which of the following focuses primarily on the technical issues of keeping systems up and running
disaster recovery planning
Client/server computing is a:
distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.
Distribution and delivery of products to retailers is part of the
downstream portion of the supply chain
Data cleansing not only corrects errors but also: A) establishes logical relationships between data. B) structures data. C) normalizes data. D) removes duplicate data. E) enforces consistency among different sets of data.
enforces consistency among different sets of data.
A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.
entity-relationship diagram.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A) touch points. B) netcenters. C) hot points. D) wireless hubs. E) hotspots.
hotspots
The business value of an effective supply chain management system includes all of the following except:
improved delivery service
Uncertainties in the supply chain often lead to:
increases in inventory across all tiers
A distributed database
is a database that is stored in multiple physical locations
A VPN
is an encrypted private network configured within a public network
A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.
key field
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.
normalization.
Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box.
predicts what you are looking for as you enter words into the query box.
The logical view of a database: A) displays the organization and structure of data on the physical storage media. B) includes a digital dashboard. C) allows the creation of supplementary reports. D) enables users to manipulate the logical structure of the database. E) presents data as they would be perceived by end users.
presents data as they would be perceived by end users.
A supply chain driven by forecasts of consumer demand follows a(n) ________ model.
pull based
Walmart's continuous replenishment system is an example of a(n) ________ model pull-based forecast-based enterprise-based push-based supply chain optimization
pull based
Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy
redundancy
Fault tolerant information systems offer 100 percent availability because they use:
redundant hardware, software, and power supplies
In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.
row
In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select.
select, project, and join.
Which of the following is not a method for performing a data quality audit? A) surveying entire data files B) surveying samples from data files C) surveying definition and query files D) surveying end users about their perceptions of data quality
surveying data definition and query files
All of the following have contributed to an increase in software flaws except: A) the growing complexity of software programs. B) the growing size of software programs. C) demands for timely delivery to markets. D) the inability to fully test programs. E) the increase in malicious intruders seeking system access.
the increase in malicious intruders seeking system access.
Microsoft Access's data dictionary displays all of the following information about a field except the: A) size of the field. B) format of the field. C) description of the field. D) type of the field. E) the organization within the organization that is responsible for maintaining the data.
the organization within the organization that is responsible for maintaining the data.
The domain .gov is a(n):
top-level domain
In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.
tuple.
An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:
two factor authentication
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.
uniform resource locator.
Which of the following is the single greatest cause of network security breaches?
user lack of knowledge
OLAP enables: A) users to obtain online answers to ad-hoc questions in a rapid amount of time. B) users to view both logical and physical views of data. C) programmers to quickly diagram data relationships. D) programmers to normalize data. E) users to quickly generate summary reports.
users to obtain online answers to ad-hoc questions in a rapid amount of time.
Blockchain refers to a technology that
uses a distributed ledger system of transaction
WPA2 is a more effective way to secure a wireless network than WEP because it
uses much longer encryption keys.
A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) metropolitan area network.
wide area network