MIS

Ace your homework & exams now with Quizwiz!

According to the 2018 Identity Fraud Study by Javelin Strategy & Research, how much did consumers lose to identity fraud in 2017?

$17 billion

The WiMax standard can transmit up to a distance of approximately:

30 miles

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer

5, 4, 2, 3, 1

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced.

Administrative

You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table?

Airport code

Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases?

Application server software

Which of the following statements about passwords is not true?

Authentication cannot be established by the use of a password.

Firms that allow employees to use their own devices are embracing which of the following?

BYOD

Which of the following statements about wireless security is not true?

Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

A network that spans a college or corporate facility is called a:

CAN

Which of the following is a leading networking hardware provider?

Cisco

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?

Controls

Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

Data dictionary

Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?

Data inconsistency

Which of the following is a grouping of characters into a word, a group of words, or a complete number?

Field

In data mining, which of the following involves using a series of existing values to determine what other future values will be?

Forecasting

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices?

Green computing

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

ISP

________ states that the value or power of a network grows exponentially as a function of the number of network members.

Metcalfe's Law

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network?

Modem

________ uses individual atoms and molecules to create computer chips and other devices.

Nanotechnology

Which type of software is created and updated by a worldwide community of programmers and available for free?

Open source

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?

Packet switching

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents?

Peer-to-peer network

Which of the following statements about RFID is not true?

RFIDs require line-of-sight contact to be read.

Which of the following pulls content from websites and feeds it automatically to users' computers?

RSS

________ is malware that hijacks a user's computer and demands payment in return for giving back access.

Ransomware

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

In a table for customers, the information about a single customer resides in a single:

Row

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems?

Security

On which of the following protocols is the Internet based?

TCP/IP

________ tools are used to analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.

Text mining

The Gramm-Leach-Bliley Act:

The Gramm-Leach-Bliley Act:

Which one of the following statements is not true?

The Internet backbone is owned by the federal government in the United States.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

Total cost of ownership

Which of the following is a multitasking, multiuser, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms?

Unix

All of the following are current hardware platform trends except:

Unix.

Which of the following is the single greatest cause of network security breaches?

User lack of knowledge

Which of the following statements about Internet security is not true?

Wi-Fi networks are not vulnerable to security breaches.

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?

Your firm's organizational culture

Zip Realty, which combines Google Maps with real estate data, is an example of:

a mashup.

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.

access point

All of the following are types of information systems general controls except:

application controls.

T1 lines:

are high-speed, leased data lines providing guaranteed service levels.

Evil twins are:

bogus wireless network access points that look legitimate to users.

A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web:

browser.

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of:

click fraud.

All of the following are technologies used to analyze and manage big data except:

cloud computing.

The join operation:

combines relational tables to provide the user with more information than is otherwise available.

Interpretations of Moore's law assert that:

computing power doubles every 18 months.

IPv6 has been developed in order to:

create more IP addresses.

The select operation:

creates a subset consisting of all records in the file that meet stated criteria.

A foreign country attempting to access government networks in order to disable a national power grid is an example of:

cyberwarfare.

Which of the following focuses primarily on the technical issues of keeping systems up and running?

disaster recovery planning

Client/server computing is a:

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

Data mining allows users to:

find hidden relationships in data.

SaaS refers to:

hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

The Sarbanes-Oxley Act:

imposes responsibility on companies and management to safeguard the accuracy of financial information.

All of the following are issues with the traditional file environment except:

inability to develop specialized applications for functional areas.

An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n):

information policy.

A VPN:

is an encrypted private network configured within a public network.

A field identified in a record as holding the unique identifier for that record is called the:

key field.

A(n) ________ is an integrated circuit which contains two or more processors to enhance performance and reduce power consumption.

multicore processor

Digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video.

A DBMS makes the:

physical database available for different logical views.

Predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except:

radiation.

Data ________ occurs when the same data is duplicated in multiple files of a database.

redundancy

A(n) ________ represent data as two-dimensional tables.

relational DBMS

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as:

software packages.

Specifications that establish the compatibility of products and the ability to communicate in a network are called:

technology standards.

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:

the Internet of Things.

OLAP enables:

users to obtain online answers to ad-hoc questions in a rapid amount of time.

WPA2 is a more effective way to secure a wireless network than WEP because it:

uses much longer encryption keys.

A database ________ describes a database entity.

value

A network that covers entire geographical regions is most commonly referred to as a(n):

wide area network.


Related study sets

There's a variety of volcanic activity and resultant landforms and landscapes.

View Set

The Fetal Head and Brain - Penny

View Set

Serv Safe Manager's Course Chapter 7: The Flow of food: Storage

View Set

quiz Management of Patients with Chronic Pulmonary Disease

View Set

Health Assessment HESI Exam (EAQ Based)

View Set

CUMULATIVE ARIELLE SENSATION QUIZLET

View Set