Test 2 over Unit 2 MIS Cronk

Ace your homework & exams now with Quizwiz!

Which of the following is a type of optical drive storage? a.) Blu-ray b.) Hard drive c.) USB flash drive d.) Magnetic tape e.) SSD

a.) Blu-ray

________ controls formalize standards, rules, procedures, and control disciplines to ensure that the organization's general and application controls are properly executed and enforced. a.) Software b.) Administrative c.) Data security d.) Implementation e.) Input

b.) Administrative

Which of the following is not a type of input device? a.) Digital scanner b.) Flat panel (LCD) display screen c.) Trackball d.) Keyboard e.) Sensor

b.) Flat panel (LCD) display screen

What type of device gathers data and converts them into electronic form for use by the computer? a.) Output device b.) Input device c.) Optical storage d.) Magnetic storage e.) SAN

b.) Input device

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? a.) Web 3.0 application b.) IoT application c.) BLE application d.) GPS application e.) RFID application

b.) IoT application

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? a.) Logging transactions b.) Managing the supply chain c.) Lowering network costs d.) Enabling client communication e.) Improving employee engagement

b.) Managing the supply chain

Computer forensics tasks include all of the following except: a.) presenting collected evidence in a court of law. b.) securely storing recovered electronic data. c.) collecting physical evidence on the computer. d.) finding significant information in a large volume of electronic data. e.) recovering data from computers while preserving evidential integrity.

c.) collecting physical evidence on the computer

A foreign country attempting to access government networks in order to disable a national power grid is an example of: a.) phishing. b.) denial-of-service attacks. c.) cyberwarfare. d.) cyberterrorism. e.) evil twins.

c.) cyberwarfare

Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: a.) system software. b.) application software. c.) data management software. d.) network software. e.) web services software.

c.) data management software

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. a.) two b.) five c.) eight d.) fifteen e.) twenty

c.) eight

Client/server computing is a: a.) network that connects sensors to desktop computers. b.) network where centralized mainframe computers serve local devices. c.) centralized model of computing for large corporations. d.) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. e.) centralized computing model where local computers are connected to one another by a network.

d.) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

The most basic business database is comprised of: a.) three tables: for suppliers, parts, and sales. b.) four tables: for customers, suppliers, parts, and sales. c.) four tables: for customers, suppliers, sales, and employees. d.) five tables: for customers, employees, suppliers, parts, and sales. e.) attributes instead of tables.

d.) five tables: for customers, employees, suppliers, parts, and sales

All of the following are examples of wearable computing devices except: a.) smartwatches. b.) smart badges. c.) activity trackers. d.) smart glasses. e.) smartphones.

e.) smartphones

Which digital cellular standard is used widely throughout the world except the United States? a.) GSM b.) CDMA c.) WLAN d.) LTD e.) 4G

a.) GSM

A statement ranking information risks and identifying security goals would be included in which of the following? a.) Security policy b.) AUP c.) Risk assessment d.) Business impact analysis e.) Business continuity plan

a.) Security policy

Which of the following is an example of a legacy system? a.) Transaction processing system running on a mainframe b.) Scalable grid computing system c.) Web services running on a cloud computing platform d.) MDM software e.) Quantum computing system

a.) Transaction processing system running on a mainframe

Which process is used to protect transmitted data in a VPN? a.) Tunneling b.) PPP c.) VOIP d.) Packet-switching e.) Chaining

a.) Tunneling

Which of the following is an example of a keylogger? a.) Zeus b.) Conficker c.) Sasser d.) ILOVEYOU e.) Cryptolocker

a.) Zeus

Running a Java program on a computer requires: a.) a Java Virtual Machine to be installed on the computer. b.) a Java Virtual Machine to be installed on the server hosting the Java applet. c.) an applet to be downloaded to the user's computer. d.) no extra or specialized software, as Java is platform-independent. e.) an Intel processor and the Windows operating system.

a.) a Java Virtual Machine to be installed on the computer

You use ________ to predict when a computer hardware system becomes saturated. a.) capacity planning b.) virtualization c.) localization d.) measured service e.) SLAs

a.) capacity planning

Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? a.) Desktop publishing software b.) Spreadsheet software c.) Graphics software d.) Presentation software e.) Data management software

a.) desktop publishing software

A firewall allows the organization to: a.) enforce a security policy on data exchanged between its network and the Internet. b.) check the accuracy of all transactions between its network and the Internet. c.) create an enterprise system on the Internet. d.) check the content of all incoming and outgoing email messages. e.) create access rules for a network.

a.) enforce a security policy on data exchanged between its network and the Internet.

In terms of the data relationships found by data mining, sequences refers to: a.) events linked over time. b.) patterns that describe a group to which an item belongs. c.) occurrences linked to a single event. d.) undiscovered groupings. e.) classifications when no groups have yet been defined.

a.) events linked over time

A VPN: a.) is an encrypted private network configured within a public network. b.) is more expensive than a dedicated network. c.) provides secure, encrypted communications using Telnet. d.) is an Internet-based service for delivering voice communications. e.) is a proprietary networking service technology developed by individual corporations.

a.) is an encrypted private network configured within a public network

A Trojan horse: a.) is software that appears to be benign but does something other than expected. b.) is a virus that replicates quickly. c.) is malware named for a breed of fast-moving Near-Eastern horses. d.) installs spyware on users' computers. e.) is a type of sniffer used to infiltrate corporate networks.

a.) is software that appears to be benign but does something other than expected.

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: a.) it typically focuses on a single subject area or line of business. b.) all the information is historical. c.) it uses a web interface. d.) all of the information belongs to a single company. e.) it is open-source.

a.) it typically focuses on a single subject area or line of business

In clustering, a data mining tool will find: a.) new groupings within data. b.) related predictions from existing values. c.) several events grouped by time. d.) new associations. e.) forecasts for future events.

a.) new groupings within data

OLAP is a tool that enables users to: a.) obtain online answers to ad hoc questions in a rapid amount of time. b.) view both logical and physical views of data. c.) quickly diagram data relationships. d.) normalize data. e.) find hidden patterns in large databases.

a.) obtain online answers to ad hoc questions in a rapid amount of time

Wireless sensor networks (WSNs) are used for the following tasks except: a.) processing consumer transactions. b.) monitoring machines. c.) detecting radioactive materials. d.) protecting property. e.) identifying vehicles for trucking firms.

a.) processing consumer transactions.

Pharming involves: a.) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. b.) pretending to be a legitimate business's representative in order to garner information about a security system. c.) setting up fake website to ask users for confidential information. d.) using emails for threats or harassment. e.) setting up fake Wi-Fi access points that look as if they are legitimate public networks.

a.) redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser.

The Gramm-Leach-Bliley Act: a.) requires financial institutions to ensure the security of customer data. b.) specifies best practices in information systems security and control. c.) imposes responsibility on companies and management to safeguard the accuracy of financial information. d.) outlines medical security and privacy rules. e.) identifies computer abuse as a crime and defines abusive activities.

a.) requires financial institutions to ensure the security of customer data.

Translating software to different languages is commonly referred to as: a.) software localization. b.) scaling. c.) service-oriented architecture. d.) outsourcing. e.) open sourcing.

a.) software localization

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: a.) the Internet of Things. b.) the Semantic Web. c.) Internet2. d.) a 3-D Web. e.) Web 2.0.

a.) the Internet of Things

An analyst asked to perform a TCO analysis for a system would need to take into account all of the following factors except: a.) the minimum response time for processing business transactions. b.) lost productivity if hardware or software failures cause the system to be unavailable for processing and user tasks. c.) real estate and utility costs for housing and providing power for the technology. d.) the purchase or license of software for each user. e.) the cost to provide training to information systems specialists and end users.

a.) the minimum response time for processing business transactions

To analyze the direct and indirect costs and determine the actual cost of specific technology implementations, you would use a: a.) total cost of ownership model. b.) return on investment model. c.) break-even point. d.) cost benefit analysis. e.) capacity plan.

a.) total cost of ownership model

Blockchain refers to a technology that: a.) uses a distributed ledger system of transactions. b.) uses a centralized data store in the cloud. c.) relies on the Internet to provide secure transactions. d.) uses existing banking systems to transfer funds. e.) relies on peer-to-peer networks.

a.) uses a distributed ledger system of transactions

A digital certificate system: a.) uses third party CAs to validate a user's identity. b.) uses digital signatures to validate a user's identity. c.) uses tokens to validate a user's identity. d.) is used primarily by individuals for personal correspondence. e.) protects a user's identity by substituting a certificate in place of identifiable traits.

a.) uses third party CAs to validate a user's identity

A(n) ________ is software for locating and managing stored web pages. a.) web server b.) net server c.) router d.) modem e.) hub

a.) web server

Which of the following best describes the importance of creating an accurate data model for your business's database? a.) It is not essential, as the data model itself is modified by the database continuously. b.) It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve. c.) It is essential, as table relationships cannot be created without an accurate data model. d.) It is somewhat important, as the type of data model will define what kinds of data will be stored. e.) It is unnecessary, as a well-designed database should not require one.

b.) It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve

Which of the following statements is not true about cloud computing? a.) It is the fastest-growing form of computing. b.) It removes the concern about data and systems security for businesses. c.) It allows smaller firms to use resources previously unaffordable. d.) It relies on the Internet as the platform for delivering services to users. e.) Charges for cloud resources are based on resources actually used.

b.) It removes the concern about data and systems security for businesses

Which of the following pulls content from websites and feeds it automatically to a user's computers? a.) FTP b.) RSS c.) HTTP d.) Bluetooth e.) IPv6

b.) RSS

All of the following are tools or technologies for extracting information from unstructured data sets except: a.) sentiment analysis software. b.) SQL queries. c.) Hadoop. d.) a non-relational DBMS. e.) text mining.

b.) SQL queries

Which of the following software tools would you use to prepare a break-even analysis? a.) Word processing b.) Spreadsheet c.) Desktop publishing d.) Personal information management e.) Presentation graphics

b.) Spreadsheet

Which of the following statements about client/server computing is not true? a.) The client provides the user interface. b.) The bulk of processing occurs on the client. c.) Computing on the Internet is based on the client/server model. d.) The client is normally a desktop or laptop computer. e.) The server provides security, remote access, and user authentication.

b.) The bulk of processing occurs on the client

Which of the following best illustrates the relationship between entities and attributes? a.) The entity CUSTOMER with the attribute PRODUCT b.) The entity CUSTOMER with the attribute ADDRESS c.) The entity PRODUCT with the attribute PURCHASE d.) The entity PRODUCT with the attribute CUSTOMER e.) The entity ADDRESS with the attribute CUSTOMER

b.) The entity CUSTOMER with the attribute PRODUCT

Capabilities and tools to manage and analyze large quantities and different types of data from multiple sources are collectively known as: a.) DSS. b.) business intelligence infrastructure. c.) OLAP. d.) data mining. e.) in-memory computing.

b.) business intelligence infrastructure

IPv6 has been developed in order to: a.) update the packet transmission protocols for higher bandwidth. b.) create more IP addresses. c.) allow for different levels of service. d.) support Internet2. e.) reduce excess IP addresses.

b.) create more IP addresses

In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data. a.) high availability computing b.) deep packet inspection c.) application proxy filtering d.) stateful inspection e.) unified threat management

b.) deep packet inspection

Links pointing to an online document are a sign of: a.) richness or variety of topics covered. b.) popularity. c.) data quality. d.) data usage. e.) marketing.

b.) popularity

Microsoft Excel is an example of: a.) data management software. b.) spreadsheet software. c.) presentation graphics. d.) word processing software. e.) presentation graphics software.

b.) spreadsheet software

The domain .gov is a(n): a.) Internet root domain. b.) top-level domain. c.) host domain. d.) network domain. e.) third level domain.

b.) top-level domain

Microsoft Word is an example of: a.) open source software. b.) word processing software. c.) software productivity suite. d.) data management software. e.) presentation graphics software.

b.) word processing software

Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. a.) 10 percent b.) 25 percent c.) 35 percent d.) 50 percent e.) 80 percent

c.) 35 percent

What are the four layers of the TCP/IP reference model? a.) Physical, Application, Transport, and Network Interface b.) Physical, Application, Internet, and Network Interface c.) Application, Transport, Internet, and Network Interface d.) Application, Hardware, Internet, and Network Interface e.) Software, Hardware, Network Interface, Internet

c.) Application, Transport, Internet, and Network Interface

________ describes the practices and technologies used to minimize the environmental effects of manufacturing and managing computing devices. a.) Capacity planning b.) Cloud computing c.) Green computing d.) Utility computing e.) On-demand computing

c.) Green computing

Which organization manages the domain name system of the Internet? a.) none (no one "owns" the Internet) b.) W3C c.) ICANN d.) The Department of Commerce (U.S.) e.) IAB

c.) ICANN

Which of the following is not an example of a computer used as a target of crime? a.) Knowingly accessing a protected computer to commit fraud b.) Accessing a computer system without authority c.) Illegally accessing stored electronic communication d.) Threatening to cause damage to a protected computer e.) Breaching the confidentiality of protected computerized data

c.) Illegally accessing stored electronic communication

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? a.) MAN b.) Domain-based LAN c.) Peer-to-peer network d.) WAN e.) SAN

c.) Peer-to-peer network

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n): a.) TCO. b.) SOA. c.) SLA. d.) API. e.) capacity plan.

c.) SLA.

Which of the following is the most prominent data manipulation language today? a.) Access b.) DB2 c.) SQL d.) Crystal Reports e.) Hadoop

c.) SQL

In lightweight PCs, smartphones, and tablets, which of the following have replaced hard drives? a.) CD-ROM b.) RAID c.) SSDs d.) Magnetic tape e.) SANs

c.) SSDs

________ refers to the ability of a system to expand to serve a number of users without breaking down. a.) Capacity planning b.) Management future planning c.) Scalability d.) Guaranteed levels of service e.) Service level agreements

c.) Scalability

Two-factor authentication utilizes a(n): a.) unique password. b.) encrypted connection. c.) a multistep process of authentication. d.) a firewall. e.) a digital certificate.

c.) a multistep process of authentication

Non-relational databases: a.) store information in an unstructured format. b.) use rows and columns to organize data. c.) are used to store structured and unstructured data. d.) are used to store low volumes of transactional data. e.) use database-mapping to normalize relations.

c.) are used to store structured and unstructured data

The National Institute of Standards (NIST) defines cloud computing as having all of the following characteristics except: a.) measured service. b.) ubiquitous network access. c.) collaboration service. d.) rapid elasticity. e.) on-demand self-service.

c.) collaboration service.

A(n) ________ is a dedicated computer in a client/server environment that hosts a DBMS. a.) web server b.) online server c.) database server d.) client server e.) application server

c.) database server

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: a.) co-location. b.) cloud computing. c.) grid computing. d.) client/server computing. e.) centralized processing.

c.) grid computing

Shopping bots use ________ software for searching the Internet. a.) Web 2.0 b.) Web 3.0 c.) intelligent agent d.) comparison e.) SEO

c.) intelligent agent

In terms of the data relationships found by data mining, associations refers to: a.) events linked over time. b.) patterns that describe a group to which an item belongs. c.) occurrences linked to a single event. d.) undiscovered groupings. e.) classification when no groups have yet been defined.

c.) occurrences linked to a single event

Fault tolerant information systems offer 100 percent availability because they use: a.) high-capacity storage. b.) a multitier server network. c.) redundant hardware, software, and power supplies. d.) dedicated phone lines. e.) a digital certificate system.

c.) redundant hardware, software, and power supplies

Which of the following is not an essential characteristic of cloud computing? a.) On-demand self-service b.) Rapid elasticity c.) Measured service d.) Open source software e.) Ubiquitous network access

d.) Open source software

Which of the following statements about RFID is not true? a.) RFIDs transmit only over a short range. b.) RFIDs use an antenna to transmit data. c.) Microchips embedded in RFIDs are used to store data. d.) RFIDs require line-of-sight contact to be read. e.) RFID tags and antennas come in a variety of shapes and sizes.

d.) RFIDs require line-of-sight contact to be read

Which of the following types of computers are used for weather forecasting on a national or worldwide scale? a.) Mainframe b.) Server c.) Minicomputer d.) Supercomputer e.) PC

d.) Supercomputer

Which of the following statements is not true about search engines? a.) They are arguably the Internet's "killer app." b.) They have solved the problem of how users instantly find information on the Internet. c.) They are monetized almost exclusively by search engine marketing. d.) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. e.) Users are increasingly using search engines on mobile devices.

d.) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

Which of the following is a visual programming tool and environment for creating applications that run on Microsoft Windows operating systems? a.) Java b.) C++ c.) XML d.) Visual Basic e.) COBOL

d.) Visual Basic

A ________ is a repository for raw unstructured data or structured data that for the most part have not yet been analyzed. a.) data mart b.) data warehouse c.) dashboard d.) data lake e.) relational DBMS

d.) data lake

The logical view of a database: a.) shows how data are organized and structured on the storage media. b.) presents an entry screen to the user. c.) allows the creation of supplementary reports. d.) presents data as they would be perceived by end users. e.) shows the relationships between entities and attributes.

d.) presents data as they would be perceived by end users

As discussed in the chapter case, all of the following are benefits of wearable computing devices except: a.) providing geolocation information for employees. b.) delivering instant notifications to sales managers. c.) using analytic software for performance metrics. d.) processing customer credit card information. e.) providing access to corporate databases.

d.) processing customer credit card information

An analyst asked to perform capacity planning for a system would need to take into account all of the following factors except: a.) the maximum number of users a system can accommodate at one time. b.) the minimum response time for processing business transactions. c.) the impact of future software applications. d.) the purchase price of new computer hardware equipment. e.) the volume of transactions.

d.) the purchase price of new computer hardware equipment

A one-to-many relationship between two entities is symbolized in a diagram by a line that ends: a.) in two short marks. b.) in one short mark. c.) with a crow's foot. d.) with a crow's foot preceded by a short mark. e.) in three short marks.

d.) with a crow's foot preceded by a short mark

Which of the following is not an example of the consumerization of IT? a.) Google's G Suite b.) BYOD c.) Facebook d.) Gmail e.) Amazon Web Services

e.) Amazon Web Services

Which of the following techniques stops data packets originating outside the organization, inspects them, and passes the packets to the other side of an organizations firewall? a.) NAT b.) Packet filtering c.) Deep packet inspection d.) Stateful inspection e.) Application proxy filtering

e.) Application proxy filtering

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? a.) Sasser b.) Zeus c.) Cryptolocker d.) ILOVEYOU e.) Conficker

e.) Conficker

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? a.) Legacy systems b.) SSID standards c.) Vulnerabilities d.) Security policy e.) Controls

e.) Controls

Common data quality problems include all of the following except: a.) misspelled names. b.) transposed numbers. c.) incorrect codes. d.) missing codes. e.) Internet connectivity problems.

e.) Internet connectivity problems

Which of the following specifically makes malware distribution and hacker attacks to disable websites a federal crime? a.) Computer Fraud and Abuse Act b.) Economic Espionage Act c.) Electronic Communications Privacy Act d.) Data Security and Breach Notification Act e.) National Information Infrastructure Protection Act

e.) National Information Infrastructure Protection Act

________ identify the access points in a Wi-Fi network. a.) NICs b.) Mac addresses c.) URLs d.) UTMs e.) SSIDs

e.) SSIDs

The smallest unit of data a computer can handle is called a: a.) file. b.) record. c.) field. d.) byte. e.) bit.

e.) bit

Within a corporate information services department, the task of establishing the physical database and its logical relations are responsibilities of the ________ function. a.) data management b.) data administration c.) server administration d.) data modeling e.) database administration

e.) database administration

Predictive search in Google's search engine: a.) maintains a history of your searches and then predicts what you will search on next. b.) uses a tracking service and cookies on your browser to predict search results. c.) uses a knowledge graph of what similar people searched on to predict your search interests. d.) uses a semantic approach to predict what you are looking for. e.) predicts what you are looking for as you enter words into the query box.

e.) predicts what you are looking for as you enter words into the query box


Related study sets

Med Surg Chapter 24: Nursing Management: Patients With Intestinal and Rectal Disorders: PREPU

View Set

Intro to International Relations Final Exam

View Set

Chapter 43: The Child With Hematologic or Immunologic Dysfunction

View Set

Clin Med 1 : Test 1 (water, macronutrients, micronutrients)

View Set

Principles of Business Final Study Set

View Set

Chapter 7: The Skeletal System/Chapter 8: Joints

View Set