MIS 3302 Exam 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

A company has many offices in the same building. They have several switches and routers with different capabilities and speeds. The IT decided to connect computers in the same rooms to a common switch and connect each switch to a more powerful router at the same level. What kind of network topology is formed?

Tree topology

2
New cards

A network interface card (NIC) operates at the Open Systems Interconnected (OSI) model’s ____ layers

Physical and Data link layer

3
New cards

____ is a high speed carrier service that uses ordinary phone circuits to send and receive data

Digital Subscriber Line (DSL)

4
New cards

Internet Protocol (IP) operates at the ___ of the Open Systems Interconnection (OSI) model

Network layer

5
New cards

In the context of data communication, which is true of convergence?

It requires major network significant upgrade because video requires much more bandwidth to transmit effectively over the network.

6
New cards

Mobile Networks have a three part architecture composed of:

base stations, MTSO and subscribers

7
New cards

__ allows the linking of devices running on many different platforms

Transmission Control Protocol/ Internet Protocol

8
New cards

Transmission Control Protocol operates the ___ of the (OSI) model

transport layer

9
New cards

In computer and network security; a security system is said to posses ___ when it does not allow data to be corrupted or unauthorized changes to a corporate database

integrity

10
New cards

In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over

Security Socket Layer

11
New cards

A security analyst needs to create a document to outline procedures for keeping an organization operating during a natural disaster, network attack, or intrusion. This document is called a

business continuity plan.

12
New cards

A systems administrator notices that users report they can no longer access the company’s website. The admin can see a flood of requests upon looking at the server. What type of security attack should be reported to the security officer?

Denial of Service (DoS) attack.

13
New cards

A department at a university has been hijacked repeatedly with unauthorized access through user logins. Which type of access control may need to be addressed?

password

14
New cards

Similar to phishing, ___ is directing internet users to fraudulent websites to steal their personal info., such as SS #, passwords

pharming and other sensitive data.

15
New cards

A security vendor needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips and the webbing between fingers against stored data to verify a users identity. Which biometric security measure should be implemented?

Hand geometry

16
New cards

__permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literacy reviews.

Fair use

17
New cards

A patent protects product names and identifying marks. True or False?

False. A patent protects inventions, while trademarks protect product names and identifying marks.

18
New cards

An acceptable use policy is:

set of rules specifying a systems legal and ethical use and the consequences of non-compliance

19
New cards

What protects the contents of an HTML code?

Copyright law

20
New cards

In a relational database model, how can one table be cross referenced to another table so that data can be retrieved from both tables?

Using foreign keys to establish relationships between tables.

21
New cards

__ can be described as using an organization’s database of customers to promote products or services that an organizations officers

Database marketing

22
New cards

The advantage of the __ access method is that both sequential and random access can be used to access records, depending on the number being accessed

indexed sequential access method.

23
New cards

in the context of big data, velocity is

the speed with which the data has to be gathered and processed

24
New cards

Considering the data types in a database, which is a source of internal data

sales records

25
New cards

The data manipulation component of a database management system (DBMS) would be used for which activites?

This component is used for retrieving, inserting, updating, and deleting data within the database.

26
New cards

__refers to new objects being created faster and easier by entering new data in attributes in an object-oriented database.

Inheritance

27
New cards

The object-oriented programming language principle of inheritance is a feature that reduces applications development time by allowing objects to inherit existing code rather than rewriting it.

False

28
New cards

__bits equal one byte

Eight

29
New cards

Describe a memory device

The contents of programmable read-only memory cannot be reprogrammed or re-written

30
New cards

Computers cannot store massive amounts of data in small spaces

Flase

31
New cards

Advantage when using an object-oriented programming language?

The amount of code required would be reducted

32
New cards

An__ is a type of server that stores computer software, which users can access from their workstation

application server

33
New cards

An item that contains both data and the procedures that read and manipulate it is called an

object.

34
New cards

A terabyte is equal to __bytes

2^40bytes or 1,099,511,627,776 bytes.

35
New cards

In__ data is lost when the computer is off

random access memory

36
New cards

When comparing the principles of Object-oriented programming: abstraction, inheritance, polymorphism, and encapsulation, which one has the ability to process objects differently depending on their data type or class?

Polymorphism.

37
New cards

The threat of new entrants into the marketplace is high when duplicating a company product or service is difficult

False

38
New cards

__is one strategy identified by Michael Porter for successfully competing in the marketplace

Differentiation

39
New cards

the __ component of an information system consists of raw facts and is difficult to use for making decisions

data

40
New cards

In the Five Force model, an organization limits buyers choices by:

offering services that make it difficult to for customers to switchto a competitor.

41
New cards

Walmart uses just in time inventory system. What type of competitive advantage does this provide?

Cost leadership by minimizing inventory costs and maximizing efficiency.

42
New cards

Why would an organization decide to hire a CISCO?

to combat the increasing number of security breaches

43
New cards

in the context of IT jobs____Must have knowledge and understanding of data warehouse and data-mining tools

database administrator

44
New cards