OMIS Exam 2

Ace your homework & exams now with Quizwiz!

Most servers operate at ____ percent of capacity.

15-20%.

Interpretations of Moore's law assert that computing power doubles every ____.

18 months.

Today's nanotechnology-produced computer transistors are roughly equivalent in size to ____.

A virus.

___ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.

Accountability.

A(n) ____ server is used to communicate between a Web server and an organization's back-end systems.

Application server.

____ is the phenomenon of employees using their own devices in the workplace.

BYOD.

____ enables advertisers to display more relevant ads based on user's search and browsing history.

Behavioral targeting.

____ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.

Blade servers.

A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web ____.

Browser.

____ protects the creators of intellectual property from having their work copied by others.

Copyright law.

The most common reason business systems fail is ____.

Data quality.

The ____ brought copyright law to the internet age by outlawing the circumvention of technology-based protections of copyrighted materials.

Digital Millennium Copyright Act.

The extreme difference among different social groups regarding their access to computers and the internet is called the ____ divide.

Digital.

____ is a societal practice of having laws that are known and understood along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process.

The development of TCP/IP occurred during the ____ era.

Enterprise computing.

A database server is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.

False.

A primary example of centralized processing is client/server computing.

False.

According to several court findings, the general functional features of software are protected by copyright law.

False.

Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can't be tied to a specific person.

False.

Application server software is responsible for locating and managing stored Web pages.

False.

COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

False.

Data scrubbing is a more intensive corrective process than data cleansing.

False.

Gaining unapproved access to a computer is not a federal crime.

False.

HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language.

False.

IT infrastructure consists of just those physical computing devices required to operate the enterprise.

False.

In a client/server environment, a DBMS is located on a dedicated computer called a Web server.

False.

In today's legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.

False.

Multiple data marts are combined and streamlined to create a data warehouse.

False.

OLAP is unable to manage and handle queries with very large sets of data.

False.

Quantum computing is implemented primarily with enterprise or ISP servers.

False.

Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.

False.

SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their Web sites.

False.

Software programs were unprotected by copyright law until the early 1990s.

False.

Spam is legally defined as any e-mail that is unsolicited.

False.

TCO refers to the original cost of purchased technology: both hardware and software.

False.

The European Parliament has yet to ban unsolicited commercial messaging.

False.

The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.

False.

The routine violation of individual privacy is made more difficult by advances in data storage.

False.

The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.

False.

Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.

False.

A data warehouse is composed of ____.

Historic and current internal data.

____ are created by combining and customizing components from different online software applications.

Mashups.

____ states that the value or power of a network grows exponentially as a function of the number of network members.

Metcalf's Law.

In a ____ network the work of the entire network is balanced over several levels of servers.

Multi-tiered.

____ surfaces allow users to gesture on a screen with several fingers to execute commands.

Multitouch.

____ is a new data analysis technology that finds hidden connections between data in disparate sources.

NORA.

____ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.

Nanotechnology.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called ____.

Normalization.

In the ____ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.

Opt-out.

____ is the practice of contracting customer software development to an outside firm.

Outsourcing.

A field identified in a table as holding the unique identifier of the table's record is called the ____.

Primary key.

____ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.

Profiling.

The moral dimension of ____ can be described as the obligations that individuals and organizations have concerning rights to intellectual property.

Property rights and obligations.

____ supports the ability to in many different states at once, dramatically increasing processing power.

Quantum computing.

___ are not held liable for the messages they transmit.

Regulated common carriers.

In a relational database, the three basic operations used to develop useful sets of data are ____, ____, and ____.

Select, project, join.

As per the ____, if an action cannot be taken repeatedly, it is not right to take at all.

Slippery-slope rule.

A SAN is a ____ network.

Storage area.

____ unleash powerful economics of scale and result in price declines in manufactured computer products.

Technology standards.

A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.

True.

An application server may reside on the same computer as a Web server or on its own dedicated computer.

True.

An application that transfers information from an organization's internal database to a Web server for delivery as part of a Web page to the user is called middleware.

True.

An attribute is a characteristic or quality used to describe a particular entity.

True.

Any intellectual work product that isn't based on public knowledge can be classed as a trade secret.

True.

Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

True.

Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.

True.

Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.

True.

DBMS have a data definition capability to specify the structure of the content of the database.

True.

Databases record information about general categories of information referred to as entities.

True.

Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.

True.

Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True.

Every record in a file should contain at least one key field.

True.

High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.

True.

Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.

True.

In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.

True.

In green computing, reducing computer power consumption is a top priority.

True.

In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.

True.

Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.

True.

Liability is a feature of political systems and allows individuals to recover damages done to them by others.

True.

Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.

True.

Most Internet businesses do very little to protect the privacy of their customers.

True.

One of the key concepts in patent law is novelty.

True.

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

True.

The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture.

True.

The coupling of data with the software programs that manipulate the data, such that changes in programs requires changes to the data, is called program-data dependence.

True.

The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.

True.

The logical and physical views of data are separated in a DBMS.

True.

The operating system is used to manage the computer's activities.

True.

The organizational function that is in charge of policies and procedures for managing internal data resources is called data administration.

True.

The policies and processes for managing the integrity and security of data in a firm are referred to as data governance.

True.

The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to honor these settings.

True.

The rate of global piracy is approximately 42%.

True.

The symptoms of technostress include aggravation and hostility toward humans.

True.

Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user's online behavior.

True.

Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.

True.

You can manipulate data on a Web server by using a CGI script.

True.

The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is ____.

Unix.

____ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.

Virtualization.

A recent addition to the mobile digital platform is ____.

Wearable computing devices.

The ____ PC becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor.

Wintel


Related study sets

MED TERM 2: CH. 19 MULTIPLE CHOICE

View Set

Test 2 - Chapter 5 - Contraception and Abortion

View Set

movements that occur at synovial joints

View Set

GLG 171 - Chapter 9: Ice, Wind, and Deserts

View Set

Police Studies - Investigation and Report Writing

View Set

Brady Chap5: Medical Terminology and A/P

View Set