MIS 3302 Exam 1

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 43

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

44 Terms

1

A company has many offices in the same building. They have several switches and routers with different capabilities and speeds. The IT decided to connect computers in the same rooms to a common switch and connect each switch to a more powerful router at the same level. What kind of network topology is formed?

Tree topology

New cards
2

A network interface card (NIC) operates at the Open Systems Interconnected (OSI) model’s ____ layers

Physical and Data link layer

New cards
3

____ is a high speed carrier service that uses ordinary phone circuits to send and receive data

Digital Subscriber Line (DSL)

New cards
4

Internet Protocol (IP) operates at the ___ of the Open Systems Interconnection (OSI) model

Network layer

New cards
5

In the context of data communication, which is true of convergence?

It requires major network significant upgrade because video requires much more bandwidth to transmit effectively over the network.

New cards
6

Mobile Networks have a three part architecture composed of:

base stations, MTSO and subscribers

New cards
7

__ allows the linking of devices running on many different platforms

Transmission Control Protocol/ Internet Protocol

New cards
8

Transmission Control Protocol operates the ___ of the (OSI) model

transport layer

New cards
9

In computer and network security; a security system is said to posses ___ when it does not allow data to be corrupted or unauthorized changes to a corporate database

integrity

New cards
10

In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over

Security Socket Layer

New cards
11

A security analyst needs to create a document to outline procedures for keeping an organization operating during a natural disaster, network attack, or intrusion. This document is called a

business continuity plan.

New cards
12

A systems administrator notices that users report they can no longer access the company’s website. The admin can see a flood of requests upon looking at the server. What type of security attack should be reported to the security officer?

Denial of Service (DoS) attack.

New cards
13

A department at a university has been hijacked repeatedly with unauthorized access through user logins. Which type of access control may need to be addressed?

password

New cards
14

Similar to phishing, ___ is directing internet users to fraudulent websites to steal their personal info., such as SS #, passwords

pharming and other sensitive data.

New cards
15

A security vendor needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips and the webbing between fingers against stored data to verify a users identity. Which biometric security measure should be implemented?

Hand geometry

New cards
16

__permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literacy reviews.

Fair use

New cards
17

A patent protects product names and identifying marks. True or False?

False. A patent protects inventions, while trademarks protect product names and identifying marks.

New cards
18

An acceptable use policy is:

set of rules specifying a systems legal and ethical use and the consequences of non-compliance

New cards
19

What protects the contents of an HTML code?

Copyright law

New cards
20

In a relational database model, how can one table be cross referenced to another table so that data can be retrieved from both tables?

Using foreign keys to establish relationships between tables.

New cards
21

__ can be described as using an organization’s database of customers to promote products or services that an organizations officers

Database marketing

New cards
22

The advantage of the __ access method is that both sequential and random access can be used to access records, depending on the number being accessed

indexed sequential access method.

New cards
23

in the context of big data, velocity is

the speed with which the data has to be gathered and processed

New cards
24

Considering the data types in a database, which is a source of internal data

sales records

New cards
25

The data manipulation component of a database management system (DBMS) would be used for which activites?

This component is used for retrieving, inserting, updating, and deleting data within the database.

New cards
26

__refers to new objects being created faster and easier by entering new data in attributes in an object-oriented database.

Inheritance

New cards
27

The object-oriented programming language principle of inheritance is a feature that reduces applications development time by allowing objects to inherit existing code rather than rewriting it.

False

New cards
28

__bits equal one byte

Eight

New cards
29

Describe a memory device

The contents of programmable read-only memory cannot be reprogrammed or re-written

New cards
30

Computers cannot store massive amounts of data in small spaces

Flase

New cards
31

Advantage when using an object-oriented programming language?

The amount of code required would be reducted

New cards
32

An__ is a type of server that stores computer software, which users can access from their workstation

application server

New cards
33

An item that contains both data and the procedures that read and manipulate it is called an

object.

New cards
34

A terabyte is equal to __bytes

2^40bytes or 1,099,511,627,776 bytes.

New cards
35

In__ data is lost when the computer is off

random access memory

New cards
36

When comparing the principles of Object-oriented programming: abstraction, inheritance, polymorphism, and encapsulation, which one has the ability to process objects differently depending on their data type or class?

Polymorphism.

New cards
37

The threat of new entrants into the marketplace is high when duplicating a company product or service is difficult

False

New cards
38

__is one strategy identified by Michael Porter for successfully competing in the marketplace

Differentiation

New cards
39

the __ component of an information system consists of raw facts and is difficult to use for making decisions

data

New cards
40

In the Five Force model, an organization limits buyers choices by:

offering services that make it difficult to for customers to switchto a competitor.

New cards
41

Walmart uses just in time inventory system. What type of competitive advantage does this provide?

Cost leadership by minimizing inventory costs and maximizing efficiency.

New cards
42

Why would an organization decide to hire a CISCO?

to combat the increasing number of security breaches

New cards
43

in the context of IT jobs____Must have knowledge and understanding of data warehouse and data-mining tools

database administrator

New cards
44
New cards
robot