Looks like no one added any tags here yet for you.
A company has many offices in the same building. They have several switches and routers with different capabilities and speeds. The IT decided to connect computers in the same rooms to a common switch and connect each switch to a more powerful router at the same level. What kind of network topology is formed?
Tree topology
A network interface card (NIC) operates at the Open Systems Interconnected (OSI) model’s ____ layers
Physical and Data link layer
____ is a high speed carrier service that uses ordinary phone circuits to send and receive data
Digital Subscriber Line (DSL)
Internet Protocol (IP) operates at the ___ of the Open Systems Interconnection (OSI) model
Network layer
In the context of data communication, which is true of convergence?
It requires major network significant upgrade because video requires much more bandwidth to transmit effectively over the network.
Mobile Networks have a three part architecture composed of:
base stations, MTSO and subscribers
__ allows the linking of devices running on many different platforms
Transmission Control Protocol/ Internet Protocol
Transmission Control Protocol operates the ___ of the (OSI) model
transport layer
In computer and network security; a security system is said to posses ___ when it does not allow data to be corrupted or unauthorized changes to a corporate database
integrity
In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over
Security Socket Layer
A security analyst needs to create a document to outline procedures for keeping an organization operating during a natural disaster, network attack, or intrusion. This document is called a
business continuity plan.
A systems administrator notices that users report they can no longer access the company’s website. The admin can see a flood of requests upon looking at the server. What type of security attack should be reported to the security officer?
Denial of Service (DoS) attack.
A department at a university has been hijacked repeatedly with unauthorized access through user logins. Which type of access control may need to be addressed?
password
Similar to phishing, ___ is directing internet users to fraudulent websites to steal their personal info., such as SS #, passwords
pharming and other sensitive data.
A security vendor needs to develop a security system for a personal site that compares the length of each finger, the translucence of fingertips and the webbing between fingers against stored data to verify a users identity. Which biometric security measure should be implemented?
Hand geometry
__permits you to use copyrighted material for certain purposes, such as quoting passages of a book in literacy reviews.
Fair use
A patent protects product names and identifying marks. True or False?
False. A patent protects inventions, while trademarks protect product names and identifying marks.
An acceptable use policy is:
set of rules specifying a systems legal and ethical use and the consequences of non-compliance
What protects the contents of an HTML code?
Copyright law
In a relational database model, how can one table be cross referenced to another table so that data can be retrieved from both tables?
Using foreign keys to establish relationships between tables.
__ can be described as using an organization’s database of customers to promote products or services that an organizations officers
Database marketing
The advantage of the __ access method is that both sequential and random access can be used to access records, depending on the number being accessed
indexed sequential access method.
in the context of big data, velocity is
the speed with which the data has to be gathered and processed
Considering the data types in a database, which is a source of internal data
sales records
The data manipulation component of a database management system (DBMS) would be used for which activites?
This component is used for retrieving, inserting, updating, and deleting data within the database.
__refers to new objects being created faster and easier by entering new data in attributes in an object-oriented database.
Inheritance
The object-oriented programming language principle of inheritance is a feature that reduces applications development time by allowing objects to inherit existing code rather than rewriting it.
False
__bits equal one byte
Eight
Describe a memory device
The contents of programmable read-only memory cannot be reprogrammed or re-written
Computers cannot store massive amounts of data in small spaces
Flase
Advantage when using an object-oriented programming language?
The amount of code required would be reducted
An__ is a type of server that stores computer software, which users can access from their workstation
application server
An item that contains both data and the procedures that read and manipulate it is called an
object.
A terabyte is equal to __bytes
2^40bytes or 1,099,511,627,776 bytes.
In__ data is lost when the computer is off
random access memory
When comparing the principles of Object-oriented programming: abstraction, inheritance, polymorphism, and encapsulation, which one has the ability to process objects differently depending on their data type or class?
Polymorphism.
The threat of new entrants into the marketplace is high when duplicating a company product or service is difficult
False
__is one strategy identified by Michael Porter for successfully competing in the marketplace
Differentiation
the __ component of an information system consists of raw facts and is difficult to use for making decisions
data
In the Five Force model, an organization limits buyers choices by:
offering services that make it difficult to for customers to switchto a competitor.
Walmart uses just in time inventory system. What type of competitive advantage does this provide?
Cost leadership by minimizing inventory costs and maximizing efficiency.
Why would an organization decide to hire a CISCO?
to combat the increasing number of security breaches
in the context of IT jobs____Must have knowledge and understanding of data warehouse and data-mining tools
database administrator