MIS Exam 3
Evil Twin
A normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit.
Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored?
A remote server
Brian needs to use an expensive application that his work provides on his computer at the office. However, he's traveling with his laptop and won't be back in his office for another week. Then Brian remembers his employer also makes the application available to employees through the cloud. What does Brian need to do next to use this application?
Access the application through his laptop's browser
Internet Service Provider (ISP)
Allows network to communicate with other networks over the internet
Marley is setting up Internet service with an ISP and wants to make sure she has a high-capacity connection for watching online movies. What type of connection should she request?
Broadband
Which company most likely relies almost solely on B2B transactions in their course of business?
Chemical Supply Companies
when your computer accesses a webpage, what role is your computer filling in the network architecture?
Client
Who enforces PCI compliance for merchants who accept credit card payments from customers?
Credit card companies
Which data type would be best suited to a field that lists a product's clearance price?
Currency
Which type of data storage allows for the most variety of data types?
Data lake
Which of the following job roles would most likely need permission to delete records in a customer's table?
Database Administrator
Carlos is arranging a series of weekly conference calls for people in different parts of the world. Which of the following tools can he use to inform participants about the call details?
Digital Calendar
Liena is thinking of running for her local school board and wants to use social media to reach supporters. Which of the following negative effects of social media might affect her campaign?
Disinformation
Hackers pose the only real risk to database security? (T or F)
False
Open-source DBMS are insecure because users are allowed to see the software's code. (T or F)
False
Tammy spends time each day reading updates and news articles in her industry. She's always looking for new sources of quality information. What tool can best help her do this?
which of the following is the most secure SSID for at a family residence
GoVols
Xavier is designing a Student table that will continue to track students after they completed programs. What should he label it?
Graduated
Dr. Davis wants to store backups of her patients' medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?
HIPPA
Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?
He can remotely collaborate with teammates on projects, deadlines, and events.
Sonia works from home and uses the Internet often throughout the day. When they're home, Sonia's husband and children also use her network for gaming, social media, and streaming videos or music. Which of the following best describes Sonia's network?
Home network
Which of these devices would least likely be found on a modem network?
Hub
Donna is setting up her own web server to provide information to her clients, How will her web server be uniquely identified on the internet?
IP Address
What kind of software do you need to create a blog?
ISP
Which kind of cloud service requires the most technical skill to use
IaaS
When you tell your smartphone to check for any new email messages, what device does the smartphone communicate with?
Incoming mail server
One of Richard's duties in his new job is to be active on LinkedIn and other professional social networks. Which of the following activities should he avoid when using social media for his company?
Inviting visitors to solve brain teasers
Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?
It will make the AI system sound more human
Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?
Machine Learning (ML)
Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn't understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her?
Mason said one of Alexa's wake words
Which network is most likely to function well even if one device fails?
Mesh network
Which of the following devices connects to the internet through an internet service provider?
Modem
Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future?
More information about his needs
Felipe works for an insurance agency with about 50 employees. The HR director recently sent an email requesting information on who plans to attend the company picnic in two weeks. The next morning when Felipe signs into his computer, he finds dozens of emails filling his inbox with responses to the HR director's inquiry, and none of them are emails Felipe needed to see. What most likely caused this problem?
Most people used the Reply all button.
Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem?
NAS
What device is most likely installed on your computer to connect it to a wired or wireless network?
Network Interface Card (NIC)
Which of the following is not an RDBMS?
Oracle NoSQL Database
Sandhya is installing a security camera at the entrance. What technology can she use to get power to the security cameras?
PoE
Yuri is preparing for a certification exam in his industry and needs to study. However, he has a long commute for work each day where he's driving in crowded traffic. What form of digital communication would best help Yuri put this time to good use
Podcasts
Malcolm has a job interview tomorrow that will be conducted by video conference. What steps should he take today to prepare for the interview?
Prepare the background area behind his chair
shipping services often add tags to shipped packages that can be scanned and monitored through wireless communication. Which network protocol is the best fit for this purpose?
RFID
Which learning model allows an AI system to develop its own strategies from solving problems or completing tasks?
Reinforcement learning
Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work?
Robotic Process automation
Rafael needs to run a query that will show the name and city of all his clients. Which phrase should he use?
SELECT Name, City
Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements?
SaaS
Hayley is an accessibility advocate at a small college and frequently shares information with her co-workers about how to better accommodate students with learning challenges. The college president has complimented her efforts and asked her to find ways to make this information more readily available and better organized for new, incoming instructors. What kind of site might best help Hayley achieve this goal?
Social Curation site
Which of these file types is optimized for processing calculations of numbers in a budget?
Spreadsheet
How is big data measured?
Terabytes
Tazneen works for a manufacturing company that just set up a messaging platform for employees. Which of the following message types would be inappropriate for her to send at work?
Text messages containing bad news
sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem?
The table is filtered
Which e-commerce job roles require training and a license
Truck Driver / Forklift operator
Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved (T or F)
True
Cloud computing and the internet are two different technologies (T or F)
True
Some nonrelational databases support SQL-based languages. (T or F)
True
Which learning model allows an AI system to create its own categories of data without labeling those categories ?
Unsupervised Learning
Tori is traveling for a business conference. How can Tori protect her financial information?
Use VPN
What can Tyler do to protect his wireless network from his neighbors?
Use a strong password for authentication
Kabir is buying a new wireless router and wants to make sure his internet communication are private. What feature should the new router include?
WPA2 Encryption
Kori's department is learning how to use some new software. She wants to set up a knowledge base so team members can document what they're learning, easily share it with each other, and organize the information for easy reference later. Which type of digital media is best suited to their needs? Group of answer choices
Wiki
During a meeting at work your boss starts talking about DaaS. What can you assume?
You'll access this server over the internet
Which of these tasks is a non-technical user most likely to have the right to perform in a database?
add new data
Cade uses social media sites to network with customers, coworkers, and other professionals in his industry. He blogs, shares articles, and comments on other people's content as well. Lately, one follower has been posting inappropriate, harassing comments on Cade's posts. What can Cade do to minimize the disruption this person is causing?
block the person
Dillon writes weekly short stories that he also illustrates. He wants to post his stories online to increase his exposure and hopefully get a writing contract with a publisher. Which type of digital communication technology would be the best fit for Dillon's goals?
blog
Dennis is sure he sent an email to his boss explaining his need to take off for the afternoon so he could go to a doctor's appointment. However, his boss claims she never saw the email. How can Dennis confirm that he sent the email?
check his sent items folder
Randall needs to monitor rapidly changing statistics for a social media campaign for his company. Which of the following should he use to access this information?
dashboard
Conducting a staff meeting online so employees from around the globe can join the discussion is an example of
e-business
which network type is often used for vendor access?
extranet
All the pet names in a veterinarian's database are stored in a _______ called PetName.
field
What can you use as a protective barrier to keep out unauthorized traffic?
firewall
which of the following items is not required to have a functioning network?
internet
which of the following email addresses would be best fit for a business consultant?
Why might a blogger choose to post on a blogging network instead of posting on the blogger's own website?
more exposure
Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment?
rapid elasticity
Amber just joined a new social networking site that her friend, Tracey, recommended. She's enjoying the online conversations and wants to connect with more people on the site. Which of the following is an effective and respectful way for Amber to expand her friend list?
search for other people on the site she might already know and add them to her friends list.
Zeke is settling in at a coffee shop for some study time before his next class. He notices the coffee shop's wireless network is secured and not open. What information does he need to ask from the barista so he can access the wireless network and get onto the Internet?
security key
Nancy receives a call from someone claiming to work for the local sheriff's office. The person says she will be fined if she doesn't pay with her credit card over the phone. What kind of attack is this?
social engineering
Quincy suspects that passwords and other personal information were electronically stolen from his computer. What kind of malware might be infecting his computer?
spyware
Which field could serve as the primary key for a list of students in your school?
student ID number
Internet
system of two or more devices linked together
what does a dsl modem use to connect to an ISP
telephone cable
Hub
transfers all data to all devices
switch
transfers data to intended devices
A national bank processes approximately 1500 transactions per second. This is due to its high ___
velocity