MIS250 EXAM 2 WSU
_____ provide data, voice, and video connectivity to employees, customers, and suppliers.
Telecommunication services
Business managers, working with information system specialist, should estimate all the following components of a risk assessment EXCEPT ______.
The identity of the organization that created the malware
Networks of interconnected wireless devices that are embedded in the physical environment to provide measurements of many points over large spaces are called _______.
Wireless Sensor Networks (WSNs)
Independent computer programs that copy themselves from one computer to others over a network are called _____.
Worms
Data which are not visible to the average user are called ________.
ambient data
A risk ________ determines the level of risk to an organization if an activity or process is not properly controlled.
assessment
The method of slicing digital messages into pieces, sending the pieces over different communication media, and then reassembling the pieces is called ________.
packet switching
Hackers flooding a network server with many thousands of false communication requests is called ________.
A denial-of-service attack
A model of computing that provides a shared pool of computing resources for an organization to use over the internet is called _____
Cloud computing
A firms ______ should include an awareness of computer forensics
Contingency planning process
A(n) ______ is a database that stores historic and current data for the use of decision makers in an organization
Data Warehouse
The process of detecting and correcting errors in a database is called _______.
Data cleansing
Finding hidden patterns and relationships in large databases and inferring rules from them to predict future behavior is called ______.
Data mining
________ operate over existing telephone lines to carry data, voice, and video.
Digital Subscriber Line (DSL) Technologies
All the following are eras in IT infrastructure evolution except the _____
Disruptive Technology Era
______ converts domain names to IP addresses
Domain Name System (DNS)
A person, place, or thing that is stored in a database is called a(n) _____.
Entity
_____ is a lightweight operating system for cloud computing.
Google Chrome OS
The law that requires financial institutions to ensure confidentially of customer data is called the _______.
Gramm-Leach-Bliley Act
An open-source framework for parallel processing across inexpensive computers is called ______.
Hadoop
All the following are important questions about IT governance EXCEPT _____.
How data should be stored in a database
A new version of IP addressing, which contains 128-bit addresses, is called ______.
IPv6
_____ are used reliably and securely to handle high transaction volumes, analyze huge data sets, and support large workloads in cloud data centers.
Mainframe computers
A network that spans a city is called a(n) ______.
Metropolitan Area Network (MAN)
_____ states that the number of components that a computer chip can hold doubles every two years
Moore's Law
________ use a more flexible data model and are designed for big data.
Non-relational database management systems
Free software produced by a team of hundreds of thousands of programmers around the world is called _____.
Open Source Software
A communication processor used to direct packets of data through different networks is called a ______.
Router
The network operating system (NOS) _______.
Routes and manages network traffic
A type of malware that takes advantage of poorly coded web applications is called ______.
SQL injection attacks
The law that applies to publicly traded companies and is designed to protect investors is called the _____.
Sarbanes-Oxley Act
The ability of a computer, product, or system to expand to serve more users without breaking down is called _____.
Scalability
In relational databases, the ______ operation creates a subset of records in the file that meet stated criteria.
Select
All the following are total cost of ownership infrastructure components EXCEPT _____.
Staff salaries
All the following are parts of the Transmission Control Protocol/Internet Protocol Reference Model EXCEPT ______ layer.
Switching
All the following are methods of authentication EXCEPT _______.
TCP/IP
All the following are wearable computing devices EXCEPT _____
Tablet Computers
The range of frequencies that can be accommodated on a telecommunications channel is called _______.
Bandwidth
______ is a popular name for a networking standard useful for creating small personal-area networks
Bluetooth
The widespread use of personal devices in the workplace and school is often referred to as _____.
Bring your own device (BYOD)
Data is considered to be ________ when the same attribute has different values in different systems.
Inconsistent
_____ support(s) a firms website and include(s) web hosting services, routers, and cabling or wireless equipment.
Internet Platforms
________ feature(s) monitor the network at its most vulnerable points.
Intrusion detection systems
_____ is an object-oriented programming language that is processor and operating system independent.
Java
______ systems are older transaction processing systems, usually created for mainframes
Legacy
The leading operating system on servers, mainframe computers, and supercomputers is _____.
Linux
All the following are physical transmission media EXCEPT ______.
Power lines
The unique identifier for all data in a table is called the ______.
Primary key
The coupling of files used to store information and the application program that updates and maintains those files is called _____.
Program-data dependence
A form of encryption that uses two keys is called ________.
Public key encryption
A type of computer that could be in many states at once is called a _____.
Quantum Computer
_______ is very useful for inventory and supply chain management.
Radio Frequency Identification (RFID)
When thinking about security, controls_______.
Refers to policies and procedures that ensure the safety of an organizations assets.
The decision to purchase or rent IT assets is called the ______ decision.
Rent-versus-buy
All the following are essential characteristics of the cloud EXCEPT _____.
Web Beacons
All the following are major internet services EXCEPT _______.
Web Beacons
All the following are types of information that are obtained from data mining EXCEPT ______.
Web beacons
A set of loosely coupled software components that exchange information with one another using universal standards and languages are called _____.
Web services
A new family of standards developed to deal with the fact that people in remote areas do not have access to WIFI is called ________.
WiMAX
The career field that deals with collection and examination of computer data for legal evidence is called ________.
computer forensics
A(n) ________ is a structured survey of the accuracy and level of completeness of data in an information system
data quality audit
A(n) ______ enables an organization to centrally manage and organize data.
database management system
A(n) ______ is a discrete binary waveform used for transmission of data.
digital signal
A grouping of characters into a word or group of words is called a(n) ________.
field
A combination of hardware and software that prevents unauthorized users from accessing a network is called a ________.
firewall
_______ is another way to facilitate big data analysis and remove bottlenecks normally found in a traditional database.
in-memory computing
A(n) _________ specifies the rules of an organization for sharing and disseminating information
information policy
All the following are general controls EXCEPT _____ controls.
input