MGS 351 EXAM 2 MULTIPLE CHOICE

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/60

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:58 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

61 Terms

1
New cards

When simplifying the relationships on an ERD, what rule should be applied for 1:N relationships?

Primary key of the 1 side of the relationship should be added as a foreign key on the opposite side of the relationship.

2
New cards

If one doctor can be related to many patients, and one patient can be related to one doctor, what is the relationship that results?

1:N

3
New cards

Which of the following is the most accurate interpretation of a M:N relationship between Orders and Products?

-Many orders can be related to many products.

-A single order can be related to many products.

-A single product can be related to many orders.

-B and C

-None of the above.

-A single order can be related to many products.

-A single product can be related to many orders.

4
New cards

Database designers document the conceptual data model with:

an entity-relationship diagram

5
New cards

When simplifying the relationships on an ERD, what rule should be applied for 1:1 relationships?

Relationships should be merged into 1 table with one entity becoming an attribute of the other.

6
New cards

A characteristic or quality describing an entity is called a(n):

attribute.

7
New cards

What is a primary key of one table that appears in another table?

Foreign key

8
New cards

If many clients can be related to many salespeople, what is the relationship that results?

Not enough information to determine the relationship.

9
New cards

Who is the person responsible for the more technical and operational aspects of managing the information contained in organizational databases?

Database administrator

10
New cards

Who finds vulnerabilities in systems and often fixes the problems?

White-hat hackers

11
New cards

What is the weakest link in computer security?

People

12
New cards

What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

Public key encryption

13
New cards

What says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?

Fair Use Doctrine

14
New cards

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

Copyright

15
New cards

Which operating system is safe from attacks?

All operating systems are vulnerable to attack.

16
New cards

What looks for people on the network who shouldn't be there or who are acting suspiciously?

Intrusion-detection software

17
New cards

Decryption is the process of transforming _________ message back to _________ message.

ciphertext, plain text

18
New cards

All of the following are considered biometrics, except:

Password

19
New cards

biometrics

Fingerprint

Retina

Voice

20
New cards

Who would like to be hackers, but don't have much technical expertise?

Script kiddies

21
New cards

What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic?

Worm

22
New cards

What is hardware and/or software that protects computers from intruders?

Firewall

23
New cards

What is the unauthorized use, duplication, distribution or sale of copyrighted software?

Pirated software

24
New cards

Which of the following floods a Web site with so many requests for service from multiple computers that the Web site slows down or crashes?

Distributed denial-of-service attacks

25
New cards

Which of the following is a random, secret value placed with the encryption algorithim to encrypt or decrypt messages?

key

26
New cards

Which of the following can identify suspicious network traffic entering your network?

Intrusion Detection System

27
New cards

Why do computers need telecommunications protocols?

-Computers are "dumb" and don't know how to communicate

-Computers need to communicate using a common "language"

28
New cards

What technological advancement in fiber optic cabling allows for multiple colors of light to be sent on the same strand of fiber?

Dense Wavelength Division Multiplexing (DWDM)

29
New cards

Microwave signals

-follow a straight line.

-have been used for telecommunications between the North and South campuses here at UB.

30
New cards

Wired media is also called _______ media and wireless media is also called _______ media.

Bounded, Unbounded

31
New cards

Which of the following has 8 wires bundled in twisted pairs?

Ethernet cable

32
New cards

Which of the following lists the networking devices in order of intelligence from "dumb" to "smart"?

Hub, switch, router

33
New cards

How would you classify the computer lab network in the room you have recitation?

LAN

34
New cards

Which networking device connects multiple computers in a network and broadcasts all messages to all computers on the network?

Hub

35
New cards

What type of server are you accessing with your client when you access www.ebay.com?

Web server

36
New cards

Which term describes a point on the Internet where several connections converge?

Network access points

37
New cards

Telnet is the capability to/for:

log onto a remote computer and work on it

38
New cards

Which of the following prompted the initial surge in Internet usage in the early 1990's?

The development of the WWW and the graphical web browser Mosaic.

39
New cards

The original purpose of the Internet was

to enable researchers to collaborate and share data.

40
New cards

FTP is the capability to/for:

upload and download files from one computer to another.

41
New cards

A company employing an extranet must be sure to put a(n) _________________ in place.

firewall

42
New cards

Which of the following is generally used as a B2E network?

Intranet

43
New cards

Which of the following events prompted the creation of CERT?

The Internet worm of 1988.

44
New cards

Which of the following is a true statement?

IP addresses are used to identify machines on the Internet.

45
New cards

Which of the following is a true statement?

-TCP/IP is the protocol of the Internet.

-The word Internet comes from the combination of the 2 words "interconnected networks".

46
New cards

Which of the following is a true statement?

The WWW is less than 40 years old.

47
New cards

What percent of information systems fail after being developed and implemented?

80%

48
New cards

During which phase of the SDLC is the Requirements Definition Document created?

System Analysis

49
New cards

During which phase of the SDLC is a technical blueprint of how the proposed system will work developed?

System Design

50
New cards

During which phase of the SDLC is the feasibility study originally conducted?

Preliminary Analysis

51
New cards

System testing:

tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned.

52
New cards

Which of the following approaches to organizational change is the most conservative (i.e. low risk, low return)?

Automation

53
New cards

Which example of organizational change "tweaks" the existing business processes to streamline them a bit?

Rationalization of Procedures

54
New cards

How many phases are in the SDLC?

It depends which textbook you read!

55
New cards

During which SDLC phase is it cheapest to find an error? Hint: the sooner you discover an error, the better!

Preliminary Analysis

56
New cards

Which type of error is the most difficult to find?

logic error

57
New cards

Which phase involves end-users and IT specialists working together (JAD) to gather, understand, and document the business requirements for the proposed system?

System Analysis phase

58
New cards

Which system conversion strategy is best suited for a mission critical system?

Parallel

59
New cards

Which system conversion strategy is the riskiest?

Direct cutover

60
New cards

What in a Salesforce App can help prevent GIGO?

-Correct data types for fields.

-Appropriately defined validation rules.

-Descriptive field help text.

-Properly established field sizes.

61
New cards

Automation that can perform advanced operations, making the Salesforce App more powerful and user-friendly is called a _________.

flow builder