MIS 301 Midterm exam review
what does binary mean?
0 or 1
________ cellular networks use digital signals and can transmit voice and data at different speeds based on how fast the user is moving; it supports video, web browsing, and instant messaging. 1G 2G 3G 4G
3G
LTE is ________ cellular technology. 2G 4G 3G 5G
4G
how many bits in a byte
8 bits in a byte
_________ is the most difficult, radical, lengthy, and comprehensive strategy. BPR BPS BPM BPI
BPR
Which of the following is NOT an example of alien software? Blockware Spyware Spamware Adware
Blockware
Which of the following is not in the business analytics domain? Predictive analytics Descriptive analytics Prescriptive analytics In-memory computing
In-memory computing
Which of the following is FALSE of QR codes? QR codes are more resistant to damage than bar codes. QR codes are larger than bar codes because they store information both horizontally and vertically. QR codes can store much more information than bar codes. QR codes can be read from any direction or angle.
QR codes are larger than bar codes because they store information both horizontally and vertically.
______ is the most popular query language used for interacting with a database. SQL TPS ETL RFID
SQL
________ networks are an emerging technology that is becoming increasingly important to help organizations manage their data flows across their enterprise networks. Software-defined Backbone Personal area Cloud
Software-defined
Which of the following is not "unstructured data"? Image file Audio file Video file Spreadsheet
Spreadsheet
________ is the protocol of the Internet. TCP/IP Ethernet Fiber DSL
TCP/IP
________ is a cable medium. Satellite Microwave Twisted-pair Radio
Twisted-pair
_________ is a private network that uses a public network to connect users. DoS VPN RFID ERP
VPN
Which of the following is NOT a characteristic of Big Data? Volume Viscous Variety Velocity
Viscous
The Internet is a ________. MAN LAN WAN PAN
WAN
Which of the following is the correct order of networks from largest to smallest? MAN, WAN, PAN, LAN WAN, MAN, PAN, LAN WAN, MAN, LAN, PAN MAN, WAN, LAN, PAN
WAN, MAN, LAN, PAN
_________ is a communications control. A company gate Encryption RFID A firewall
a firewall
_________ refers to determining who is responsible for the actions that were taken. Liability Responsibility Accountability Answerability
accountability
_________ causes pop-up advertisements to appear on your screen. Spyware Marketware Spamware Adware
adware
In ________, vendors ask partners to place logo on the partner's website and then pay that partner a commission. affiliate marketing electronic tendering viral marketing online direct marketing
affiliate marketing
Each characteristic or quality of a particular entity is called a(n) ________. instance record attribute field
attribute
Bandwidth is stated in ________ per second. beeps bytes blips bits
bits
________ is a short-range wireless network. MiFi LTE Bluetooth WiMAX
bluetooth
_________ organizations have physical and online dimensions. Brick-and-mortar Virtual Pure-play Clicks-and-mortar
clicks-and-mortar
what is a foriegn key
column(s) that provide a link btw data in two tables
The _________ approach highlights the interlocking relationships that underlie all societies. rights common good utilitarian fairness
common good
Under the convention of business flowchart, __________, shape is used to represent questions? And ___________shape is used to represent actions? How many branches should be followed by a question? ___ (not a multiple choice question)
diamond, rectangle, 2
________ is a disadvantage of fiber-optic cable. Security Cost Bandwidth Difficult to work with
difficult to work with
The _________ approach posits that ethical actions treat all human beings equally, or, if unequally, then fairly, based on some defensible standard. common good rights utilitarian fairness
fairness
Selecting and adhering to a single competitive strategy is sufficient to counter all of Porter's five forces and be successful in the long term. True False
false
The ________ creates links between two tables. primary alien secondary foreign
foreign
In _________ auctions, sellers solicit bids from many potential buyers; these auctions result in _________ prices over time. forward; higher reverse; lower forward; lower reverse; higher
forward; higher
________ is NOT an advantage of twisted-pair wire. Cost Easy to work with Availability High bandwidth
high bandwidth
________ is an advantage of coaxial cable. Easy to work with Cost Security High bandwidth
high bandwidth
A _________ site is a fully configured computer facility with all of the company's services, communication links, and physical plant operations. medium hot warm cold
hot
An order from a customer is a(n) __________ for a business process. output feedback input resource
input
Intellectual capital is another term for ________. data information wisdom knowledge
knowledge
________ is an example of pre-digital data storage that is comparable to a database. schedule of due dates on a project outline list of sales totals on a spreadsheet cash register receipt library card catalog
library card catalog
A data ________ is a low-cost, scaled-down version of a data ________ that is designed for the end-user needs in an SBU or an individual department. warehouse; mart mart; warehouse warehouse; store mart; store
mart;warehouse
________ transmission systems transmit data through electromagnetic waves. Satellite Microwave Radio Fiber
microwave
You use your smartphone to look up how much money you have in your bank account. This is an example of _________ commerce. mobile local social electronic
mobile
Dashboards are used in which of the following processes? executing a process capturing and storing process data all of the above monitoring process performance
monitoring process performance
The _________ model of informed consent prohibits an organization from collecting any personal information unless the customer specifically authorizes it. opt-out sign-up opt-in sign-out
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in sign-out sign-up opt-out
opt-out
The ________ key is an identifier field that uniquely identifies a record. foreign alien primary secondary
primary
_________ issues involve collecting, storing, and disseminating information about individuals. Accuracy Accessibility Property Privacy
privacy
In public-key encryption, the _________ key is used for locking and the _________ key is used for unlocking. public; public private; private private; public public; private
public; private
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted. Radio Microwave Satellite Fiber
radio
Whereas phishing attacks are ____, denial of service attacks are ____. remote attacks requiring no user action; remote attacks requiring user action remote attacks requiring no user action; attacks by a programmer developing a system distributed remote attacks requiring user action; attacks by a programmer developing a system remote attacks requiring user action; remote attacks requiring no user action
remote attacks requiring user action; remote attacks requiring no user action
_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility
responsibility
Each relational database table contains records (listed in _______) and attributes (listed in ______) . columns; columns rows; columns columns; rows rows; rows
rows; columns
________ transmission systems can have a large coverage area but their signals experience propagation delay. Fiber Satellite Microwave Radio
satellite
_________ is pestware that users your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Spamware Spyware Adware Marketware
spamware
Keystroke loggers and screen scrapers are examples of _________. adware spamware spyware marketware
spyware
_________ collects personal information about users without their consent. Spamware Spyware Marketware Adware
spyware
how do you count bits?
they start at 0 (0,1,2,3,4,5,6,7) so 8 bits is one byte
A foreign key is a primary key in another file. True False
true
Blacklisting is when everything can run except what is on the list. True False
true
According to the textbook, ________ is the most widely available cable medium. fiber-optic microwave radio twisted-pair
twisted-pair
The relational database model is based on the concept of ________-dimensional tables. four three two one
two
what is a primary key
usually the left most field unless it looks like it repeats
The _________ approach states that ethical action is the one that provides the most good or does the least harm. common good utilitarian rights fairness
utilitarian
The _____________ approach states that an ethical action is the one that provides the most good or does the least harm. utilitarian rights fairness common good
utilitarian
In ________, recipients of your marketing notices send information about your product to their friends. affiliate marketing online direct marketing viral marketing electronic tendering
viral marketing
_________ organizations are only online. Brick-and-click Virtual Clicks-and-mortar Brick-and-mortar
virtual
An information system's ____ is the likelihood that the system or resource will be compromised by a ____ that will result in its ____ to further attacks. threat; vulnerability; liability vulnerability; security; threat vulnerability; threat; exposure threat; vulnerability; exposure
vulnerability; threat; exposure
A data ________ is a repository of historical data that are organized by subject to support decision makers in the organization. store warehouse mart shop
warehouse
_________ is an attack by a programmer developing a system. A phishing attack Virus DoS A Trojan horse
A Trojan horse
__________ is a methodology for achieving incremental improvements in the effectiveness and efficiency of a process. BPM BPS BPR BPI
BPI
Which of the following would be an example of a SCADA attack? *Social Security numbers are deleted from a company's database. *Email accounts are hacked and kinky messages are sent to all of the user's contacts *Bank accounts are hacked into after Internet purchases *Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
Computer viruses are introduced into the electrical company's systems resulting in a shutdown of the power plant.
Hackers would use a botnet to perform a _________. a Trojan horse virus DoS a logic bomb
DoS
_________ is a remote attack requiring no user action. A Trojan horse DoS Virus A logic bomb
DoS
________ cables are made of glass. Twisted-pair Microwave Coaxial Fiber-optic
Fiber-optic
Only a few ________ satellites are needed for global coverage. LEO GEO MEO VEO
GEO
________ defines how messages are formulated and how their receivers interpret them. SMTP TCP/IP HTTP DSL
HTTP
Which of the following is a property issue? How can we ensure that the information will be processed properly and presented accurately to users? How should we handle illegally copying copyrighted software? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? What information about oneself should an individual be required to reveal to others?
How should we handle illegally copying copyrighted software?
________ was developed because we have run out of IP addresses in the original IP addressing scheme. IPv2 IPv4 IPv8 IPv6
IPv6
______________ is the right to determine when, and to what extent, information about you can be gathered and/or communicated to others. Privacy Profiling Information privacy Digital dossier
Information privacy
A network that is restricted to a single building is a ________. PAN MAN LAN WAN
LAN
Satellite telephone services are provided through ________ satellites. VEO GEO MEO LEO
LEO
________ satellites are used to run the GPS system. LEO VEO GEO MEO
MEO
________ is a broadcast medium. Microwave Twisted-pair Fiber-optic Coaxial
Microwave
Which of the following is NOT a basic function of TCP/IP? Sequences the transfer of packets Responsible for disassembling, delivering, and reassembling data during transmission Manages the movement of data packets between computers by establishing a connection between the computers Acknowledges the packets have been transmitted
Responsible for disassembling, delivering, and reassembling data during transmission
Which of the following is the most prominent data manipulation language today? DB2 SQL Access NoSQL Crystal Reports
SQL
Careless Internet surfing is _________ and is an _________ mistake. a human error; intentional social engineering; intentional social engineering; unintentional a human error; unintentional
a human error; intentional
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. Property Accuracy Privacy Accessibility
accuracy
The IT infrastructure is ___________. all of the above put together the IT services the IT personnel the IT components
all of the above put together
Which of the following is an accurate representation of the data hierarchy from smallest to largest? bit, byte, field, record, file, database bit, byte, field, file, record, database byte, bit, field, record, file, database byte, bit, field, file, record, database
bit, byte, field, record, file, database
_________ organizations are purely physical. Clicks-and-mortar Virtual Pure-play Brick-and-mortar
brick-and-mortar
A ________ is a group of eight ________. bit; bytes byte; bits field; files file; fields
byte; bits
IT ___________be used to create a competitive advantage___________. cannot; because everyone has access to technology can; because everyone has access to technology cannot; even when it is used effectively can; when it is used effectively
can; when it is used effectively
________ cables are made of copper. Radio Coaxial Fiber-optic Microwave
coaxial
Which of the following is the correct order of the KMS cycle? capture, create, refine, store, disseminate, manage capture, create, refine, store, manage, disseminate create, capture, refine, store, disseminate, manage create, capture, refine, store, manage, disseminate
create, capture, refine, store, manage, disseminate
An/The ________ is a network of networks. intranet extranet externet Internet
internet
The ________ layer of TCP/IP is responsible for addressing, routing, and packaging data packets. network interface transport Internet application
internet
The __________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. Opt-out Opt-in
opt-out
With ________, customers use the internet to self-configure products or services. group purchasing product customization electronic exchanges bartering online
product customization
Database systems minimize ________. security redundancy independence integrity
redundancy
In _________ auctions, one buyer wants to purchase a product or a service; these auctions result in _________ prices over time. reverse; lower forward; higher reverse; higher forward; lower
reverse; lower
The _________ approach maintains that an ethical action is the one that best protects and respects the moral rights of the affected parties. fairness utilitarian rights common good
rights
An electronic _________ is a website the represents a single store. mall auction storefront marketplace
storefront
What is the primary key???
the thing that will never be the same for each person (a phone number or student ID) sometimes there might be more than one thing that will always be different. The primary key is the one that will make the most sense to sort with. Ex. if student ID and phone number are there, it would probably be easier to make student ID the primary key
The ________ layer of TCP/IP provides communication and packet services. application Internet transport network interface
transport
_________ is a remote attack requiring user action. DoS A logic bomb Virus A Trojan horse
virus