isds final

Ace your homework & exams now with Quizwiz!

The field that has a unique entry for each record in a database table is called the master field. foreign key. primary key. logical key.

primary key

a system that is designed to help keep track of everyday business activities is an management information system transaction processing system enterprise resource planning system decision support system

transaction processing system

The protocol used to send e-mail over the Internet is (1 point) SMTP. DNS. DHTML. HTTP.

SMTP

the protocol to send email over the internet is

SMTP

Encryption is used to? a. code your e-mail so only one person can decipher it b. shrink the amount of space it takes to store e-mail c. transfer e-mail more quickly d. make shopping on the Internet more available

A.

IPv6 uses 32 bits to assign? a. data packet to each transmission b. a memory address to the CPU c. an address to every device connected to the Internet d. a destination Internet address to each e-mail

C

The information in a data packet includes? a. the data and the destination b. the data and circuit identifier c. the "To" address, "From" address, data, and reassembly instructions d. different types of information depending on the type of message being sent

C. "to" address, "from" address, data, and reassembly instructions

The collection of large national and international network providers used to establish the internet is called the? a. T1 b. highway system c. OC d. Internet backbone

D Internet Backbone

A small slice of a data warehouse is called a data mine. True False

False

Julian owns a large garment store that attracts hundreds of customers every week. His manager requests him to purchase a database system to track store inventory, sales, and customers. However, Julian wishes to traditionally maintain separate lists for stock, sales, and prospective customers and updates them manually every month. Which of the following is true with regard to this scenario? Julian would incur heavier expenses in maintaining a list than setting up and administering a database. Julian's entries might be subject to data redundancy. There is no possibility of Julian's data being inconsistent. If Julian changes any entry in a list, it would be automatically changed in all the lists.

Julian's entries might be subject to data redundancy

network adapters send data packets based on

MAC address

The main suite of Internet protocols used to transmit data is called (1 point) DNS. HTTP. XML. TCP/IP.

TCP/IP

a network consisting of two LANS separated by great physical distances is known as

WAN

Which of the following best refers to a group of related records in a database? Metadata Schema A table A field

a table

Which of the following is true of a database? A centralized database is a shared source of information that everyone can access. It lacks features such as accuracy and reliability of data. It requires database administrators to create simple and small databases. It is created and managed using an accounts management system.

a centralized database is a shared source of information that everyone can access

Which best describes a data warehouse? a database that organizes data from multiple organizations a collection of all the data from an organization's databases a building that stores computer servers a software program that assists with file management

a collection of all the data from an organizations databases

Which of the following statements is a characteristic of enterprise resource planning (ERP) systems? ANSWER Manual integration of various processes within the organization is required. A common database to store and integrate information is used. Data gathered from the individual business units are kept confidential. Usage of information is restricted to a single area of an enterprise.

a common database to store and integrate information is used

In data centralization, __________. access is granted to the owner of the centralized database solely security of data is diminished greatly a single file is maintained to ensure reliability and accuracy of data the efficiency is decreased as there are files to reconcile with each other

a single file is maintained to ensure reliability and accuracy of data

IPv6 uses 32 bits to assign a(n) (1 point) estination Internet address to each e-mail. address to every device connected to the Internet. memory address to the CPU. data packet to each transmission.

address to every device connected to the internet

In the client-server model, clients are phones or computers and servers are (1 point) computers hosting web pages. computers with software allowing you to make purchases. computers that are storehouses for files. all of the above

all of the above

The rise of the Internet of Things has meant (1 point) light bulbs can join your WiFi network at home. there are more machines with wireless network adapters. we need longer IP addresses than are available in IPv4. all of the above

all of the above

Which is a report generated by a management information system? exception report summary report detail report all of the above

all of the above

in client server models, clients are phones or computers and servers are computers? a. computers hosting web pages b. computers with software allowing you to make purchases c. computers that are storehouses for files d. all of the above

all of the above

Which of the following is true of records? All records in a table have the same fields but usually different data. Each column in a database is represented as a record. An entire record functions as the primary key in a database. A record is a database object in the form of rows and columns in which data is stored.

all records in a table have the same fields but usually different data

Angels is a kids-wear manufacturing company in Boston. The company wants to use software to integrate the information flowing from the production, supply chain management, and the project management departments to enable better coordination between these departments and improve the production rate. Which of the following business intelligence systems can best assist Angels in the given scenario? an enterprise resource planning system a clickstream data system a natural language processing system a batch processing system

an enterprise resource planning system

Correctly entering the user ID and password on your college network is an example of (1 point) scalability. authentication. virtualization. packet screening.

authentication

To ensure only authorized users are logging onto a network, which server would a client/server network include? (1 point) application communications authentication Internet

authentication

correctly entering the user ID and password on your college network is an example of

authentication

which of the following is used to increase security on a client/server network

bastion host

Packet switching sends information between two points (1 point) by breaking it into small chunks and sending the chunks across different routes. by finding one route between the two points and sending the data. differently for each company using it. by encrypting the data, then sending it.

by breaking it into small chunks and sending the chunks across different routes

data ______ maintains integrity

centralization

Data captured from websites as users navigate through a website is called? web-user data clickstream data time-variant data staged data

clickstream data

To manage authorized connections to external networks, which server would a client/server network include? (1 point) authentication communications application database

communications

to manage authorized connections to external networks which server would a client/server network include?

communications

Data integrity is best maintained in a database through __________. data staging data centralization data normalization data centers

data centralization

Two lists showing different values for the same data in different places of a database is an example of data irregularity. data inconsistency. data redundancy. data disparity.

data inconsistency

The process by which great amounts of data are analyzed and investigated is known as clustering. data staging. data mining. online analytical processing.

data mining

The Grey Tome library uses a large database to manage its collection of books. However, a large number of records are duplicates. This has increased the database size tremendously. Which database strategy should the library follow to overcome this redundancy? Data mining Data normalization Data centralization Data staging

data normalization

__________ reduces data redundancies in a database and ensures that the data is organized most efficiently. Data normalization Data staging Data mining Data centralization

data normalization

Paris is a librarian. She uses four different lists to maintain the library by categorizing books based on genres, authors, publishers, and price. She finds that many books in the genre list are repeated in the authors and the publishers lists. Which of the following terms best describes this duplication across lists? Data inconsistency Data redundancy Data warehousing Data staging

data redundancy

When importing data electronically from other files, __________. databases apply filters to the data to determine if it's in the correct format as defined by the data dictionary nonconforming data cannot be modified to fit the database's format the format of the database is insignificant to that of the data it is imperative to know that data cannot be imported from word processing documents

databases apply filters to the data to determine if its in the correct format as defined by the data dictionary

Which of the following is NOT a true statement when considering using databases instead of lists? Databases are easier to build and maintain than lists. Data can be easily shared among users. Data integrity can be ensured with a database. Data-entry errors can be minimized with databases.

databases are easier to build and maintain than lists

Which of the following is true of databases? Data contained in databases are seldom accurate or reliable. Use of databases invariably leads to data redundancy issues. Databases can be more time consuming and expensive to set up and administer than lists. Data stored in databases are prone to data inconsistency issues.

databases can be more time consuming and expensive to set up and administer than lists

which of the following is not an advantage of installing a network in a business enables peripheral sharing enables software sharing decentralization of files and data centralization of files and data

decentralization of files and data

A private key is important (1 point) because it enables you to use MIME. to reset your public key if you lose a password. to reboot system hardware. to decode an encrypted message.

decode an encrypted message

A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers. (1 point) CGI domain name DNS HTML

domain name

fiber optic cable would most likely be used in business networks when:

electrical or magnetic interference is present

Bridges are used to route data between two different networks. (1 point) True False

false

If you use an Internet cache, then the information displayed in your browser is automatically refreshed. (1 point) True False

false

Instant messaging is secure because of the type of encryption used. (1 point) True False

false

A database stores each category of information in columns known as __________. fields tables schema records

fields

A(n) __________ database is the simplest form of database consisting of a single list of items in a document or a spreadsheet. object-oriented relational multidimensional flat file

flat file

__________ are used to enter data into tables and make changes to existing data in the database. Data marts Input forms Foreign keys Join queries

input forms

A flat file database __________. is the most complex form of database stores data in objects is adept at handling binary large object (BLOB) type of data is a list or table in a document or a spreadsheet

is a list or table in a document or a spreadsheet

Which of the following best describes a database feature? It categorizes, filters, and sorts data within a table or between multiple tables. It controls the software and hardware that runs on a network. It manages system resources and only runs on GPS devices and video game consoles. It maintains a computer and protects it from viruses, worms, malware, and adware.

it categorizes, filters, and sorts data within a table or between multiple tables

HTTPS is different than HTTP because (1 point) it extracts data from source databases. it stores data in the data warehouse. it is a combination of HTTP and the Secure Sockets Layer (SSL). of how it transforms or reformats the data.

it is a combo of HTTP and the secure sockets layer (ssl)

Which of the following is the advantage of using a database? Large volumes of data can be stored in a single list or table in a database. Databases offer the advantage of data decentralization. It manages large amounts of data efficiently without compromising data accuracy. It is comparatively cheaper and easier to maintain than lists.

it manages large amounts of data efficiently without compromising data accuracy

Which SQL query is used to extract data that is in two or more tables? Join query Truncate query Insert query Create query

join query

Which of the following database systems uses artificial intelligence? enterprise resource planning system transaction-processing system office support system knowledge-based system

knowledge based system

Which of the following statements best distinguishes lists from databases? Unlike databases, lists incorporate data centralization techniques. Lists organize complex information, whereas databases handle relatively simpler information. Unlike databases, lists are always more expensive to create and maintain. Lists are prone to data inconsistencies, whereas databases promote data integrity.

lists are prone to data inconsistencies, whereas databases promote data integrity

JSON, Javascript Object notation is useful because it;

makes the document object modal usable in HTML

The type of database that uses fields, records, and measure as data attributes is relational. object-oriented. two-dimensional. multidimensional.

multidimensional

Siri, Cortana, and Google Now are examples of which type of knowledge-based system? expert system natural language processing system voice management system artificial intelligence

natural language processing system

A(n) __________ is the data type that is used to store pictures, charts, or files from another Windows-based application. ANSWER text object memo hyperlink

object

Which type of database would be best to handle unstructured data? object-oriented database relational database multidimensional database all of the above

object oriented database

NOS software is needed

on all computers in a client/server network

NOS software is needed (1 point) on all computers in a client/server network. only if a communications server is deployed on a client/server network. only when configuring a network in a star topology. only on the servers in a client/server network.

on all computers in a client/server network

Which type of relationship should be used to connect a Password table to a User Account table? one-to-one relationship one-to-none relationship many-to-many relationship one-to-many relationship

one to one relationship

Providing adequate security on a corporate network involves all of the following issues except

proprietary software lockout

Providing adequate security on a corporate network involves all of the following issues except (1 point) limiting physical access to networking equipment. authentication. proprietary software lockout. restricting access to servers.

proprietary software lockout

With respect to database software, a __________ contains information about a single entry in the database. ANSWER INCORRECT footnote header record cell

record

Which of the following statements is true of data normalization? It reduces the size of the database. It increases data redundancy by combining tables. It complicates the process of keeping records up to date. It decreases query speed.

reduces the size of the database

For each value in the foreign key table there is a corresponding value in the primary key table. Which of the following terms best describes this statement? Validation rule Data staging Referential integrity Normalization

referential integrity

In a database, a field __________. is a database object in which data is stored in rows and columns contains the information for a single entry in the database refers to a single piece of information in a record within a database represents each row in a database

refers to a single piece of information in a record within a database

Which is NOT a component of a database that describes how data is stored? report field record table

report

In SQL, a(n) __________ query displays a subset of data from one or more tables based on the criteria specified. insert select join delete

select

MIME is a protocol that's used when you're (1 point) executing a CGI script. sending a video file to YouTube. sending an e-mail that has a photo attached. encrypting an e-mail message.

sending an e-mail that has a photo attached

MIME is a protocol thats used when youre

sending an email that has a photo attached

Which type of network topology is most popular? (1 point) star Ethernet bus ring

star

which type of network topology is most popular?

star

HTML5 (1 point) is used to program server-side applications. supports powerful multimedia effects. provides high-level security for e-mail. is obsolete.

supports powerful multimedia effects

HTML5?

supports powerful multimedia effects

Which of the following best refers to a group of related records in a database? A table Schema A field Metadata

table

Which of the following is NOT considered metadata? the data type field name field size table name

table name

The following is a database of books in a library. From this database, which of the following best refers to a field? The column, "Publisher" The cell, "$230.00" All the records in the database The entire second row

the column,

Which of the following is a characteristic of relational database? Data synchronization across related tables is achieved by avoiding referential integrity. One relationship exists in a relational database—the many-to-many relationship. The common field in one table is the primary key, whereas the common field in a related table is the foreign key. A dimension refers to the link between tables that defines how the data is related.

the common field in one table is the primary key, whereas the common field in a related table is the foreign key

The following is a database of books in a library. From this database, which of the following refers to a record? The cell, "$230.00" The entire second row All the records in the database The column, "Publisher"

the entire second row

June Summers joins a university. The university allows new students to choose between two study plans and update it in their Fresher's List. Instead of choosing between the two plans, June writes a study plan that does not exist in the university's list of study plans. Upon review, the university administrators are confused with this nonexistent entry. Which problem is best described in this example? The inappropriate data problem The data inconsistency problem The data redundancy problem The incomplete data problem

the inappropriate data problem

Cascading style sheets allow you to quickly change? a. from server-side processing to client-side processing b. to a more secure transport protocol c. the rules for applying formatting to an HTML document d. from HTML to XML.

the rules for applying formatting to an HTML document

Which of the following best denotes a safe primary key for the employee database? The social security number of each employee The credit card number of each employee The staff ID of each employee The last name of each employee

the staff ID of each employee

Which of the following is true of lists? They are relatively expensive to maintain than databases. They actively avoid data redundancy. They are inefficient when used as a shared resource for multiple users. They do not lead to data inconsistency.

they are inefficient when used as a shared resource for multiple users

Which of the following statements is NOT true of databases? They can organize complex data at ease. They promote data integrity through data centralization. They are invariably cheaper to build and maintain than lists. They use normalization techniques to avoid data redundancy problems.

they are invariably cheaper to build and maintain than lists

Why are client/server networks usually installed in businesses?

they are more scalable than P2P networks

On client/server networks, routers (1 point) move data efficiently from node to node on the internal network. route data between two collision domains on a single network. are necessary only in networks using the ring topology. transfer data between two networks.

transfer data between two networks

on a client server network, routers

transfer data between two networks

A query is used to extract a subset of data from a database. True False

true

A web server is used to host websites on a client/server network. (1 point) True False

true

MIME is the protocol that supports sending files as e-mail attachments. (1 point) True False

true

Most modern operating systems include some type of NOS functionality. (1 point) True False

true

Your Internet service provider has a default domain name server to translate a URL into an IP address. (1 point) True False

true


Related study sets

Chapter 23: Exercise and the Environment

View Set

Major Cities and Information (Capitalize the first letter of each word and no periods) (For anything where the answer is more than one thing, it is in alphabetical order unless I say otherwise)

View Set

Chemical and Physical Layers of the Earth

View Set

Biopsychology Exam 3: Hunger and Eating

View Set

Eukaryotic cell parts (know name, function, location)

View Set

EPM102: Statistics with Computing

View Set

Chapter 3 : Risk, Economic, & Environmental Concerns

View Set

Microbiology Mutations and The Ames Test

View Set

LP1: Alterations in Fluid & Electrolytes

View Set