IS 301 Exam 2

Ace your homework & exams now with Quizwiz!

Explain DNS

- The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. - the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.

Describe TCP

- The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. - TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

__________ uses digital cable coaxial lines to deliver high-speed Internet access to homes and businesses.

Cable Internet

Describe a scenario which illustrates denial of service (DoS), a type of security loss

Computer worms infiltrating a network with so much artificial traffic that legitimate traffic cannot get through

__________ span broad geographical distances—entire regions, states, continents, or the entire globe.

Wide area networks (WANs)

What is defined as Windows operating system software on a computer with an Intel microprocessor?

Wintel PC

Instead of buying and installing software programs, subscribing companies rent the same functions from these service, with users paying on either a subscription or per-transaction basis. The scenario describes which kind of external software source?

A cloud-based software service

Describe the competitive forces model

A competitive forces model can be used to determine how much to spend on IT infrastructure and where to make strategic infrastructure investments.

Describe a data dictionary

A data dictionary is an automated or manual tool for storing and organizing information about the data maintained in a database.

Describe a multicore processor

A multicore processor is a microprocessor to which two or more processing cores have been attached for enhanced performance.

__________ is a unique 32-bit number represented by four strings of numbers ranging from 0 to 255 separated by periods that is assigned to every computer on the Internet.

An Internet Protocol (IP) address

__________ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and it specifies consequences for noncompliance.

An acceptable use policy (AUP)

Which type of software prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware?

Antivirus software

Describe application controls

Application controls include both automated and manual procedures that ensure that only authorized data are completely and accurately processed.

Symphoniz, Inc., a software company, has installed a new device at the company's entrance that replaces the smart cards that previously provided access to the company's premises. The device requires every employee to place their palm on a scanner-like device. Once an individual's palm is scanned, the fingerprints are compared with the ones stored in the database. If they match, the individual is granted access. If not, the individual must report to security and complete entry formalities. Which of the following processes is being illustrated in this scenario? a. digital certificate system b. biometric authentication c. use of a token for identification d. use of an intrusion detection system

Biometric authentication

__________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Data administration

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. IBM DB2, Oracle, SQL Server, Sybase, MySQL, EMC, Apache, and Hadoop are all examples of which component?

Data management and storage

David creates a central database by extracting, transforming, and loading metadata from various internal and external sources of information. He plans to use this database for executing various functions such as intelligence gathering, strategic planning, and analysis. This central repository of information is referred to as a __________.

Data warehouse

Daniel wants to establish a broadband connection between his computer and the local ISP. He decides to set up a connection that can operate over his existing telephone lines to carry voice, data, and video at transmission rates ranging from 385 Kbps to 40 Mbps. What will best help Daniel establish such a connection?

Digital subscriber line (DSL)

What does the Domain Name System (DNS) convert?

Domain names to IP addresses

Which of the following is a grouping of characters into a word, a group of words, or a complete number? a. record b. attribute c. field d. file

Field

What major Internet service is used to transfer files from computer to computer?

File Transfer Protocol

Information systems controls are both manual and automated and consist of general and application controls. Describe general controls

General controls govern the design, security, and use of computer programs and the security of data files in general throughout the organization's information technology infrastructure.

__________ outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data among health care providers, payers, and plans.

HIPAA

You've probably used __________ to find the best airfare on the Internet, get directions to a restaurant, do a search on Google, or connect with a friend on Facebook.

Hadoop

__________ breaks a big data problem down into sub-problems, distributes them among up to thousands of inexpensive computer processing nodes, and then combines the result into a smaller data set that is easier to analyze.

Hadoop

What typically consists of one or more access points providing wireless Internet access in a public place?

Hotspot

What has been a major threat to the Wintel dominance as a computer platform in recent years?

Increasing iPhone and Android device sales

Describe the business value of security and control

Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability. Lack of sound security and control can cause firms relying on computer systems for their core business functions to lose sales and productivity.

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. Apache, Microsoft IIS, .NET, Unix, Cisco, and Java are all examples of which component?

Internet platforms

Describe software as a service (SaaS)

It consists of services for delivering and providing access to software remotely as a Web-based service.

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. What are examples of an operating systems platform?

Microsoft Windows, Unix, Linux, Mac OS X, and Chrome

Describe a scenario which illustrates a drive-by download

Milly copies a file from the Internet to her PC, and, in the process, her PC gets infected by malware.

__________ is best defined as the capability for manipulating and analyzing large volumes of data from multiple perspectives.

Online analytical processing

Which method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive?

Packet switching

Describe program-data dependence

Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.

__________ provide(s) a powerful technology for tracking the movement of goods using tiny tags with embedded data about an item and its location.

Radio frequency identification (RFID) systems

__________ take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks.

SQL injection attacks

__________ refers to software that covertly gathers information about a user through an Internet connection without the user's knowledge.

Spyware

Describe the Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.

__________ imposes responsibility on companies and their management to protect investors by safeguarding the accuracy and integrity of financial information that is used internally and released externally.

The Sarbanes-Oxley Act

Describe the total cost of ownership (TCO) model

The total cost of ownership (TCO) model can be used to analyze direct and indirect costs to help firms determine the actual cost of specific technology implementations.

What type of malware appears to be a legitimate, benign program but carries a destructive payload and gives the creator unauthorized access?

Trojan horse

__________ organizes computing resources so that their use is not restricted by physical configuration or geographic location.

Virtualization

Describe virtualization

Virtualization organizes computing resources so that their use is not restricted by physical configuration or geographic location.

As a part of a certain communication technology, an IP network provides a single voice-data infrastructure for both telecommunications and computing services, so companies no longer have to maintain separate networks or provide support services and personnel for each type of network. Which communication technology does the scenario describe?

Voice over IP (VoIP)

Which refers to loosely coupled software components based on open Web standards that work with any application software and operating system?

Web services

__________ refers to networks of interconnected wireless devices with built-in processing, storage, and radio frequency sensors and antennas that are embedded into the physical environment to provide measurements of many points over large spaces.

Wireless sensor networks (WSNs)

Data definition is __________.

a DBMS capability that specifies the structure and content of the database

__________ consists only of computers, a connection medium, network operating system software, and either a hub or a switch.

a basic network

A structured survey of the accuracy and level of completeness of the data in an information system is called __________.

a data quality audit

__________ is/are a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

a firewall

Describe a metropolitan area network (MAN)

a network that spans a metropolitan areas, usually a city and its major suburbs.

What is a virtual private network (VPN)?

a secure, encrypted, private network that has been configured within a public network to take advantage of the economies of scale and management facilities of large networks.

Which of the following statements about the power of a relational DBMS is false? a. The relational database has become the primary method for organizing and maintaining data in information systems because it is so rigidly controlled. b. Relational database tables can be combined easily to deliver data required by users, provided that any two tables share a common data element. c. Each table in a relational database contains a key field to uniquely identify each record for retrieval or manipulation. d. Relational database products are powerful partly because they are available as cloud computing services.

a. The relational database has become the primary method for organizing and maintaining data in information systems because it is so rigidly controlled.

__________ is a method for documenting databases illustrating the relationship between various entities in the database.

an entity relationship diagram

IT infrastructure today is composed of seven major components: Internet platforms, computer hardware platforms, operating systems platforms, enterprise software applications, networking/telecommunications, consultants and systems integrators, and data management and storage. __________ overlap with, and must relate to, the firm's general network infrastructure and hardware and software platforms. a. Consulting and system integration services b. Internet platforms c. Operating systems platforms d. Computer hardware platforms

b. Internet platforms

Describe data manipulation language

is associated w/ a database management system that end users and programmers use to manipulate data in the database.

Define IT infrastructure

is the shared technology resources that provide the platform for the firm's specific information system application

__________ uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. a. quantum computing b. minicomputers c. virtualization d. nanotechnology

nanotechnology

The __________ routes and manages communications on the network and coordinates network resources.

network operating system

3G networks differ from 4G networks in that 3G networks __________.

offer fair transmission speeds for browsing the Web and online shopping, but are too slow for videos

Bluetooth is the popular name for the 802.15 wireless networking standard, which is useful for creating small __________.

personal area networks (PANs)

A __________ represents the smallest unit of data that a computer can handle.

bit

Which of the following is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver? a. Cybervandalism b. Phishing c. Encryption d. Pharming

c. Encryption

__________ is an operating system created by the open source community. a. windows RT b. Mac OS X c. Linux d. Symbian

c. Linux

Which of the following stages of IT infrastructure evolution was a period of highly centralized computing under the control of professional programmers and system operators? a. enterprise computing era b. personal computer era c. mainframe era d. cloud and mobile computing era

c. mainframe era

When dealing with platform and infrastructure change, __________ refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. a. virtualization b. outsourcing c. scalability d. autonomic computing

c. scalability

Data that are inaccurate, incomplete, or inconsistent create serious operational and financial problems for businesses because they create inaccuracies in product pricing, customer accounts, and inventory data, and lead to inaccurate decisions about the actions that should be taken by the firm. Which of the following is not a step a firm might take to make sure it has a high level of data quality? a. using data cleansing software b. using databases designed to minimize inconsistent and redundant data c. using in-memory computing d. using enterprise-wide data standards

c. using in-memory computing or data mining

What is software glue

can be widely used to reference small programs or scripts needed to integrate applications or tie subsystems together.

A database management system differs from a traditional file system in that a database management system __________.

can centralize data

Describe data cleansing

consists of activities for detecting and correcting data in a database that are incorrect, incomplete, improperly formatted, or redundant.

Describe a security policy

consists of statements ranking information risks, identifying acceptable security goals, and identifying mechanisms for achieving these goals.

Normalization is the process of __________.

creating small, stable, yet flexible data structures from complex groups of data when designing a relational database

__________ is a type of intelligence gathering that uses statistical techniques to explore records in a data warehouse, hunting for hidden patterns and relationships that are undetectable in routine reports.

data mining

Describe Moore's Law

deals w/ the exponential increase in processing power and decline in the cost of computer technology, stating that every 18 months, the power of microprocessors doubles and the price of computing falls in half.

Computer criminals use __________ on information systems to prevent legitimate users from using the system's resources.

denial-of-service attacks ex. Computer worms infiltrating a network with so much artificial traffic that legitimate traffic cannot get through

Describe a local area network (LAN)

designed to connect personal computers and other digital devices within a half-mile or 500 meter radius.

Describe Risk assessment

determines the potential frequency of the occurrence of a problem and the potential damage if the problem were to occur, and is used to determine the cost/benefit of a control.

Transmission Control Protocol __________.

establishes a connection between the computers, sequences the transfer of packets, and acknowledges that the packets were sent.

Describe cloud computing

firms and individuals obtain computing power and software as services over a network, including the Internet, rather than purchasing and installing the hardware and software on their own computers.

Business continuity planning __________.

focuses on how the company can restore business operations after a disaster strikes

Text mining tools are tools that _______.

help businesses analyze data by extracting key elements from unstructured big data sets, discover patterns and relationships, and summarize the information

What is a characteristic of the mainframe era?

highly centralized computing - a period of highly centralized computing under the control of professional programmers and systems operators, with most elements of infrastructure provided by a single vendor, the manufacturer of the hardware and the software.

4G networks differ from 3G networks in that 4G networks __________.

provide more than enough capacity for watching high-definition videos on smartphones

Jamie uses an encryption technique which requires him to have two keys. He shares one key with the senders of the message, so that they can use it to encrypt the message. He uses his private key to decrypt the received message. What encryption method applies as being exemplified in this scenario?

public key encryption

Instances of malicious intruders seeking system access to trick employees into revealing their passwords by pretending to be legitimate members of the company in need of the information are called __________.

social engineering

An information policy __________.

specifies the organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information.

The traditional telephone system, mobile cellular communication, wireless local area networks, videoconferencing systems, a corporate Website, intranets, and extranets are all components of __________.

the networking infrastructure for a large company

Describe data redundancy

the presence of the same data across multiple locations

Describe cable Internet connections

use digital cable coaxial lines to deliver high-speed Internet access to homes and businesses.

Describe radio frequency identification (RFID) systems

use tiny tags w/ embedded microchips containing data about an item and its location to transmit short-distance radio signals to special readers that then pass the data on to a computer for processing

Describe hubs

very simple devices that connect network components, sending a packet of data to all other connected devices


Related study sets

Live Virtual Machine Lab 3.2: Module 03 Install and Configure DHCP and DNS Servers

View Set

Adding and Subtracting Fractions with Like Denominators

View Set

Series 79 Knopman Marks Limited Representative Investment Banking Exam 8th Edition

View Set

Era 3 world history--short version long answers

View Set