MISY Exam 2
The ability of a person booking a flight on Southwest.com's website to reserve a car from Dollar Rent-A-Car without having to leave the airline's website is an example of the usage by Dollar Rent-A-Car and Southwest Airlines of which of the following?
Web services
The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution?
Web services
Which of the following would you use to find out which websites with content related to database design were the most often linked to by other websites?
Web structure mining
Which of the following statements about Linux is not true?
Which of the following statements about Linux is not true?
The 802.11 set of standards is known as:
Wi-Fi
A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
access point
T1 and T3 lines:
are high-speed, leased data lines providing guaranteed service levels
Implementation controls:
audit the systems development process at various points to ensure that the process is properly controlled and managed
All of the following are physical components of an RFID system except:
bar codes
The smallest unit of data a computer can handle is called a:
bit
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
bps
The business case for using grid computing involves all of the following except:
centralized maintenance.
Computer forensics tasks include all of the following except:
collecting physical evidence on the computer.
The project operation:
creates a subset consisting of columns in a table.
The intentional defacement or destruction of a website is called:
cybervandalism
A foreign country attempting to access government networks in order to disable a national power grid is an example of:
cyberwarfare.
A ________ is a repository for raw unstructured data or structured data that for the most part have not yet been analyzed.
data lake
Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called:
data management software.
A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS.
database server
A firewall allows the organization to:
enforce a security policy on data exchanged between its network and the Internet
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:
grid computing.
Big data refers to any database that:
has a large volume and variety of data.
When hackers gain access to a database containing your personal private information, this is an example of:
identity theft.
The Sarbanes-Oxley Act:
imposes responsibility on companies and management to safeguard the accuracy of financial information.
A Trojan horse:
is software that appears to be benign but does something other than expected.
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:
it typically focuses on a single subject area or line of business
Two-factor authentication utilizes a(n):
multistep process of authentication.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
normalization
In a business relational database, tables contain:
one table for each entity.
The HIPAA Act of 1996:
outlines medical security and privacy rules.
Predictive search in Google's search engine:
predicts what you are looking for as you enter words into the query box
The logical view of a database:
presents data as they would be perceived by end users.
A field identified in a table as holding the unique identifier of the table's records is called the:
primary key.
In co-location, a firm:
purchases and owns its web server but locates the server in the physical facility of a hosting service.
All of the following are examples of wearable computing devices except:
smartphones
All of the following are specific security challenges that threaten corporate servers in a client/server environment except:
sniffing.
All of the following have contributed to an increase in software flaws except:
the increase in malicious intruders seeking system access
An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except:
the purchase price of new computer hardware equipment.
All of the following are elements of a data governance policy except identifying:
the structure of the company's database.
In a multitiered network:
the work of the entire network is balanced over several levels of servers.
The domain .gov is a(n):
top-level domain.
All of the following are techniques being used to make data centers more "green" except:
use of backup generators.
A digital certificate system:
uses third party CAs to validate a user's identity.
A ________ is software for locating and managing stored web pages.
web server
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends:
with a crow's foot preceded by a short mark
Linux plays a major role in supporting business information systems and has garnered about ________ of the worldwide server market.
35 percent
________ is spyware that logs and transmits everything a user types.
A keylogger
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
Which signal types are represented by a continuous waveform?
Analog
Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organization's firewall?
Application proxy filtering
Which of the following statements about wireless security is not true?
Bluetooth is the only wireless technology that is not susceptible to hacking.
Which of the following is a virus that uses flaws in Windows software to take over a computer remotely?
Conficker
Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards?
Controls
Which type of software can be used to create professional-looking documents, brochures, or books?
Desktop publishing software
Which of the following focuses primarily on the technical issues of keeping systems up and running?
Disaster recovery planning
Which of the following statements about edge computing is not true?
Edge computing increases delays in the transmitting and processing of data.
Which of the following is not one of the top five search engines?
A grouping of characters into a word, a group of words, or a complete number is called a byte.
False
Client/server computing is the most widely used form of centralized processing.
False
Fiber-optic cable is less expensive and easier to install than wireless media.
False
In a client/server network, the client sets the rules of communication for the network.
False
In client/server computing, the server provides users access to system resources.
False
Packet filtering catches most types of network attacks.
False
Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses.
False
Text mining is the discovery of useful patterns on the web
False
The total cost of ownership refers to only the direct costs of owning hardware and software.
False
Today, most system software is custom built by in-house programmers.
False
Using an online storage service such as Dropbox is a type of virtualization.
False
Wireless networks are more difficult for hackers to gain access to because radio frequency bands are difficult to scan.
False
________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices.
Green computing
Web browser software requests web pages from the Internet using which of the following protocols?
HTTP
Which organization manages the domain name system of the Internet?
ICANN
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
ISP
Common data quality problems include all of the following except
Internet connectivity problems
Which of the following statements is not true about cloud computing?
It removes the concern about data and systems security for businesses.
Which type of network is used to connect digital devices within a city or metropolitan area?
MAN
Which of the following would an IT department use to monitor, manage, and secure mobile devices deployed across the enterprise?
MDM software
Which of the following enables users to view the same data in different ways using multiple dimensions?
OLAP
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations?
Packet Switching
Which of the following is not a characteristic of packet switching?
Packet switching requires point-to-point circuits.
Which of the following statements about RFID is not true?
RFIDs require line-of-sight contact to be read.
CryptoLocker is an example of which of the following?
Ransomware
An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?
Risk assessment
Which of the following is a device that sends packets of data through different networks ensuring they go to the correct address?
Router
All of the following are tools or technologies for extracting information from unstructured data sets except:
SQL queries.
Currently, the protocols used for secure information transfer over the Internet are:
SSL, TLS, and S-HTTP
Which of the following software tools would you use to prepare a what-if analysis?
Spreadsheet
Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit.
True
OLAP enables users to view data from different perspectives.
True
TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.
True
The Domain Name System (DNS) converts domain names to IP addresses.
True
The dark web is intentionally hidden from search engines and is accessible only with a special web browser.
True
Which of the following is an interactive, multiuser operating system developed by Bell Laboratories to be highly supportive of communications and networking?
UNIX
Which of the following is the single greatest cause of network security breaches?
User lack of knowledge
A foreign key is a field that links to a separate table.
True
Client/server computing has largely replaced centralized mainframe computing.
True
Facebook is an example of a business based on access to large databases through the web.
True
HTML specifies how text, graphics, video, and sound are placed on a web page
True
Hadoop is an open source software framework for processing large quantities of any type of data, including video and Twitter feeds.
True
In 2019, it is estimated that 215 million Americans used mobile search.
True