MIS Ch 5-8 T/F
1. Smartphones have the same security flaws as other Internet-connected devices.
True
1. Telephone networks are fundamentally different from computer networks
True
1. Web mining is the discovery of useful patterns on the Web.
True
10. A computer language translation program is an example of system software
True
10. Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms
True
11. Hypertext markup language specifies how text, graphics, video, and sound are placed on a document
True
11. In blogging, a trackback is a list of entries in other blogs that refer to a post in the first blog
True
11. OLAP is a key tool of BI
True
12. Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
12. Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years.
True
13. A foreign key is a field that links to a separate table
True
13. Fiber-optic cable is more expensive and harder to install than wire media.
True
13. Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based.
True
14. Biometric authentication is the use of physical characteristics such as retinal images to provide identification.
True
14. In-memory computing relies on a computer's main memory for storing data
True
15. The Domain Name System (DNS) converts domain names to IP addresses
True
15. The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture
True
16. Common Gateway Interface is a specification for processing data on a Web server.
True
16. NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs
True
16. VoIP technology delivers voice information in digital form using packet switching
True
17. SSL is a protocol used to establish a secure connection between two computers
True
17. Web 3.0 is a collaborative effort to add a layer of meaning to the existing Web in order to reduce the amount of human involvement in searching for and processing Web information
True
18. A firm's information policy lays out who is responsible for updating and maintaining the information in a database system
True
18. In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks
True
18. Public key encryption uses two keys
True
18. Total cost of ownership components include costs for downtime, training, and support
True
2. In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware.
True
2. Increasingly, voice, video, and data communications are all based on Internet technology
True
20. Data cleansing is the same process as data scrubbing.
True
20. Software localization refers to the entire process of converting software to operate in a second language
True
3. Every record in a file should contain at least one key field
True
3. Systems integration means ensuring the legacy systems work with new elements of the infrastructure
True
3. To create a computer network, you must have at least two computers
True
3. Viruses can be spread through e-mail.
True
4. Both Oracle and Microsoft Access use SQL to retrieve information from the database
True
5. DBMS simplify how end users work with databases by separating the logical and physical views of the data
True
5. To secure mobile devices, a company will need to implement special mobile device management software.
True
52. A DBMS is special software for creating, storing, organizing, and accessing data from a database
True
52. A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.
True
52. Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.
True
53. A physical view shows data as it is organized on the storage media
True
53. A software package for a mainframe usually requires a programmer to install it.
True
54. End users use a data manipulation language to manipulate data in the database.
True
54. Web browsers are the primary interface for accessing the Internet
True
55. Today, most Americans connect to the Internet through broadband connections at speeds up to 15 Mbps.
True
55. XML provides a standard format for data exchange, enabling Web services to pass data from one process to another.
True
57. A walkthrough is a type of software testing used before software is even written
True
57. The trunk lines of the Internet are typically owned by network service providers
True
58. When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called debugging
True
59. Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource
True
6. In a client/server network, a network server provides every connected client with an address so it can be found by others on the network
True
6. Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
True
7. Computer worms spread much more rapidly than computer viruses
True
7. Hadoop can process large quantities of any type of data, including video and Twitter feeds
True
8. In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly altered to meet demand.
True
8. One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender
True
9. A data warehouse may include information from legacy systems
True
9. A private cloud is operated by a single organization but may be managed by a third party and be located off premises
True
9. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
True
1. IT infrastructure technology is the set of physical devices required to operate the entire enterprise
False
10. A data warehouse is typically comprised of several smaller data marts
False
10. DoS attacks are used to destroy information and access restricted areas of a company's information system.
False
11. The distributed nature of cloud computing makes it somewhat easier to track unauthorized access
False
12. HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages
False
12. OLAP is used to find hidden patterns and relationships in large databases, and infer rules from these to infer future behavior
False
13. An acceptable use policy defines the acceptable level of access to information assets for different users
False
14. The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes
False
14. XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data
False
15. Implementing a Web interface for a database requires changes to the database itself
False
15. Packet filtering catches most types of network attacks.
False
16. SaaS providers deliver and provide Web-based, remote access to storage
False
17. Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support
False
17. In linking databases to the Web, the role of the application server is to host the DBMS
False
19. One of the main benefits of moving to mobile business computing platforms is the dramatically lower costs of hardware
False
19. Over 70 percent of malware today is aimed at small businesses
False
19. TCP/IP was developed in the 1960s to enable university scientists to transmit data from computer to computer
False
19. The use of different terms for identifying data in a firm's various information systems is an example of redundant data
False
2. A grouping of characters into a word, a group of words, or a complete number is called a record
False
2. Today, most system and application software is custom built by in-house programmers.
False
20. RFID technology is being gradually replaced by less costly technologies such as WSNs
False
20. Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
False
4. A mainframe is a type of legacy workstation
False
4. An NOS must reside on a dedicated server computer in order to manage a network
False
4. The term cracker is used to identify a hacker whose specialty is breaking open security systems
False
5. A hub is a networking device that connects network components and is used to filter and forward data to specified destinations on the network
False
5. Client/server computing is the most widely used form of centralized processing
False
52. Malicious software programs referred to as spyware include a variety of threats such as computer viruses, worms, and Trojan horses.
False
54. An analog signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits
False
56. An ISP is a commercial organization that owns a region of transcontinental high-speed backbone networks carrying the bulk of Internet traffic
False
56. An SaaS provider maintains a large Web server, or series of servers, and provides fee-paying subscribers with space to maintain their Web sites
False
56. Authorization refers to the ability to know that a person is who he or she claims to be
False
58. A Web server is a dedicated computer that delivers Web pages to client computers
False
58. An information policy specifies the procedures and rules for defining the structure and content of corporate databases.
False
6. Application server software is responsible for locating and managing stored Web pages
False
6. Most back-end databases are able to interpret HTML commands
False
7. Central large mainframe computing has largely replaced client/server computing
False
7. Using an online storage service such as DropBox is a type of virtualization
False
8. Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching
False
8. The two key services of Hadoop are HDFS and in-memory computing.
False
9. Mobile search makes up approximately 10% of all Internet searches
False