1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
The Term _, used to describe the cloud, means that the computing resources leased can be increased or decreased dynamically and that organizations only pay for the resources they use.
elastic
Which of the following is a characteristic of cloud-based hosting?
no obsolesce
Which of the following is a characteristic of in-house hosting?
in-depth visibility of disaster preparedness
Which of the following characteristics is a disadvantage of cloud-based hosting?
it involves high dependency on vendor
Compared to in-house hosting, cloud-based hosting .
minimizes the risk of investing in technology that will soon become obsolete
Which of the following cloud offering is just renting the equipment from the cloud vendor?
IaaS
is a category of cloud hosting where vendors provide hosted computers with an operating system, runtime environment, and middleware like a Web server or a DBMS.
PaaS
All of the following are benefits of content delivery networks except ____.
increased load time
A _ is a set of rules for organizing communication
protocol
is the use of information technology to support the sharing of content among networks of users.
social media
A is a product offered to customers that is free for basic service but costs a fee for premium service. I talked about pandora in this example in class
Freemium
Social Media (SM) communities differ from communities in the past in that they are ___.
formed based on mutual interests
are the companies that operate SM sites.
SM application providers
Which of the following is a social media application provider?
Most social media applications earn their revenue through _.
advertisements
Social media can be used to _.
do all of the above
The primary risk of peer-to-peer support in the context of social media and customer service is _.
loss of control
is when an organization uses Social Media Information Systems to collect customer opinions on products, services, or processes by asking customers for their input.
Crowdsourcing
Social Media sponsored feedback posted on an organizations social media site from customers can result in .
all of the above
The columns in a database are called .
Fields
Within MS Access, if the data entered into a given field is a numerical name, the data should not:
be calculable / include spaces
In Access within the design view, in order to assign a field as the primary key, the user must
Right click on the row of the attribute to be assigned the primary key and click primary key
A(n) is a step-by-step aid that describes each step and walks the user through creating an object in Access.
wizard
Within MS Access, a ____ displays in place of the name of a field in the data sheet view if specified.
caption
In Access, when deciding if a number is a numerical name, you can ask yourself the question, _?
Would I ever use this number in a calculation?
Within MS Access, the task path to import spreadsheet data into an existing table begins with ____.
clicked on external data top level tab
Within MS Access, metadata for a field can be entered in the section of the design view.
description
Which of the following is the smallest data element in a database?
byte
Computers that reside in different geographic locations are connected using a(n) ____.
Wide Area Network (WAN)
_ is the process of converting a poorly-structured table into two or more well-structured tables.
normalization
Metadata are _.
data that describes data
Identify the type of task that a database administrator is performing when validating the data model to be used in a database management system.
development
A database is required instead of a spreadsheet when .
lists involve data with multiple themes
In Access when creating fields in the datasheet view, after you click on the field to be named, you must _.
choose the field’s data type
In an E-R diagram, a(n) _ on a line means that at least one entity of that type is required.
vertical bar
Which of the following is a function of an ISP?
it serves as a gateway to the internet
Which of the following is an international standard language for processing a database?
SQL
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "" Employee Number"" to assign unique numbers to each employee. This column is referred to as a(n) ____.
PRIMARY KEY
A _ is a set of rules that programs on two communicating devices follow.
protocol
In order to add a description to a field in the datasheet view, first .
click the description button within the table tools fields contextual tab
Memory is expressed in _.
BYTES
Cloud Resources are _ because many different organizations use the same physical hardware.
pooled
The connection between a VPN server is called a(n) _.
tunnel
Columns that are keys to different tables than the ones in which they reside are called _.
foreign keys
Within MS Access the purpose of assigning a currency data type is to .
"Specify that the data entered into the field will be a number with formatting such as dollar signs, commas and decimal places"
take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
Drive-by sniffers
When it in _.
Brackets
A is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
Business analyst
In the lecture, I talked about Ashley Madison, the website that makes money on adultery, and how they were hacked by Anonymous, the dark web hacker group that hacks sites based on ethical considerations. After Anonymous published customer lists and member status, Ashley Madison was able to recover quickly and be back in business. This security procedure is an example of __.
backup and recovery; unauthorized data disclosure
A is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
Business process
Within MS Access, in order to specify the name of a calculated field, the user .
Create, query design, customer table, close, expand it, click on options
OR condition queries are specified _.
Staggered row
is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations such as governments.
Advanced persistent threat
Which of the following statements is TRUE about the relationship between business processes and information systems?
A business process need not relate to any information system, but an information system relates to at least one business process.
Within MS Access, the Wildcard character is a(n) ___.
Stands for anything; Asterix
When creating a query in Access, in order to query a specific record the user utilizes the row in the query design grid.
TABLE
Within MS Access, to access the Zoom feature that lets you see query details such as a calculation field's math within the Query Design Grid, you use your mouse to access the _.
Right click, zoom, change font,
Which of the following is a function of the technology office in an organization's information systems (IS) department?
Investigating new information systems
In the information system (IS) department, the group manages the process of creating new information systems as well as maintaining existing information systems.
DEVELOPMENT
Which of the following is considered a computer crime?
Hacking of information systems
A person claiming to be from central IT called Chris and asked him to participate in a password reset audit. The person had Chris change his password to the word ""123456"", and then again to a secret passphrase only Chris knew. Later that day Chris noticed odd system behavior, and then the system crashed. Chris was a victim of .
Pretexting
Rapid application development, the unified process, extreme programming, and development are when the software developer and business domain expert work closely creating, delivering and testing workable versions of applications in a short amount of time.
Agile development
Which of the following describes a malicious act committed to cause software to malfunction using an online form field entry?
SQL injection
Which of the following is generally a responsibility of users of information systems?
Following security and backup procedures
One of the reasons outsourcing is undertaken is to .
Cap an organization's financial exposure
In a business process, a(n) is defined as a collection of something.
Repository
A is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
Business analyst
Hackers from foreign adversarial governments that continue to attack U.S. infrastructure and private U.S. companies are examples of __.
Persistent threats
The purpose of the group is to protect data and information assets by establishing data standards and data management practices and policies.
Data administration
Which of the following is a right of users of information systems?
Receive effective training
Developing, operating, and maintaining an organization's computing infrastructure is a major function of the department.
Information systems
Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by .
Learning basic computer skills
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of .
Unauthorized data disclosure
In the system implementation phase of the systems development life cycle (SDLC), with installation, the new system runs alongside the old one until it has been tested and is fully operational.
Parallel
ER diagram stands for ____.
Entity Relationship Diagram