MIS Exam 2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Bits are used for computer data because they ______
answer
Are easy to represent electronically (a bit is either a zero or 1)
question
Bits are grouped into 8-bit chunks called ______
answer
Bytes (8-bit chunk=1 byte)
question
To run a program or process data, the computer first transfers the program or data from disk to the _________
answer
Main Memory
question
Which of the following is non-volatile in nature?
answer
Magnetic and optical discs are non-volatile which means their contents survive when power is off. Saving to USB or disk
(CACHE AND MAIN MEMORY ARE VOLATILE..their contents are lost when power is off)
question
Server Farms are used when the ________
answer
They are organized into a collection of servers . They process and receive thousands of service requests per minute. Computers hand-off partially processed requests from each other while keeping track of each current status of each request. Amazon can process 110 order items per second
question
Which of the following is an example of cloud computing?
answer
Form of hardware/software leasing in which organizations obtain server resources from vendors that specialize in server processing. Allows multiple org. to utilize the same computing infrastructure. (Examples: PSU for class registration, oracle, facebook, IBM, google docs and spread sheets)
question
Which of the following is one of the functions of an application program?
answer
NOT ON TEST
question
____ are commands that the CPU can process that may be specific for each processor type
answer
Instruction Sets
question
When you buy an OS for your personal computer, you are actually buying a software _____
answer
license
question
Ronald runs both windows 7 and Linux on his desktop computer. This process is called _____
answer
PC virtualization
question
Which of the following is an example of a vertical-market software?
answer
Software serves the needs of a specific industry. Examples are: dental office to schedule appointments and bill patients, auto mechanics to keep track of customer data and repairs, inventory tracking in warehouses (these are all specific softwares
question
DenTimes, a software package for dentists, is an example of a ______
answer
vertical market application software
question
Which of the following statements is true of firmware?
answer
It is a computer software installed into devices such as printers, print servers, and various types of communication devices. The software is coded just like other softwares, but installed into special, read-only memory of the printer or other devices. Program becomes the devices memory, users do not need to load firmware into the devices memory. Firmware can be changed or upgraded.
question
Which of the following is an example of a closed source project?
answer
(Microsoft Office) The source code is highly protected and only available to trusted employees and carefully vetted contractors. (Source code is a computer code written and understood by humans). Only those trusted programmers can make changes.
question
The term "open source" means that the source code of the program is ______
answer
Available to the public. (Available to users in source code form)
question
Which of the following is likely to be used by organizations with limited budgets?
answer
Organizations with limited budgets might choose Linux with Ubuntu and Open Office on clients, but this is rare. Med/Small organizations usually standardize on single client operating system. Page 15 chapter 4 notes
question
A business manager typically has NO role in the specification of _______, other than possibly approving the budget
answer
Server Hardware
question
Which of the following devices is used during the processing stage?
answer
CPU, Main Memory
question
Which of the following is an input hardware device?
answer
Keyboard, Mouse, Scanner, UPC reader, Microphone, Still Camera, Video Camera
question
A _______ is equivalent to 1,024 bytes
answer
Kilobyte (K)
question
The operating system employs _____ so that users can run multiple applications and files at the same time.
answer
Memory swapping
question
Which of the following terms refers to a collection of servers?
answer
Server Farms
question
A network of computers that appears to operate as an integrated whole is known as a(n) _____
answer
Grid Computing
question
Which of the following is a program that controls the computers resources?
answer
Operating System (OS)
question
Linux is an example of _________
answer
Linux (OS)-A version of Unix that is an example of an open source community
question
Virtualization is the process where _____
answer
One computer hosts the appearance of many computers (two OS systems). Cloud computing is feasible because cloud vendors harness the power of virtualization.
question
Which of the following is most likely to be the last choice alternative when deciding to acquire an application software?
answer
In-house development (used only when there is no other option)
question
A client-server application that requires nothing more than a browser is called a ______.
answer
Thin-Client
question
Development costs of an information system include ______.
answer
Hardware purchases, software licenses, project costs for custom software, data conversion costs, design, development, documentation, initial training costs (page 114).
question
In a database system, a ______ is the smallest piece of data
answer
Character (byte)
question
Which of the following is an example of a database product?
answer
NOT ON TEST
question
Which of the following is a developmental task of a database administrator?
answer
Create and staff DBA function, form steering committee, specify requirements, validate data model, evaluate application design
question
Identify an adaptation task of a database administrator
answer
Set up request tracking system (develop system to record/prioritize requests for change
Manage configuration change (manage impact of database structure changes on applications and users)
question
A ______ is a collection of forms, reports, queries, and programs that process a database
answer
Database application
question
Brenda wants to find a particular report containing sales analyses of the second and third quarter. After accessing the DBMS, she should type in the keyword into a ______ form to locate what she is looking for.
answer
Query
question
A hospital is using a software to analyze treatment regimen and recovery times. The software relates the dosages, regularity, and therapeutic procedures to the time taken by patients segmented across age- and illness-groups. This software is an example of a(n) ________.
answer
Application program
question
The ______ problem is unique to a multi-user database environment
answer
Lost-update problem
question
Which of the following is true of N:M relationships?
answer
One adviser can have many students and one student can have many advisers. More than one entity is allowed on each side of the relationship and that number of entities on each side can be different. N:M is also maximum cardinality which is the maximum # of entities involved in a relationship shown by crows feet.
question
If a student is allowed to have multiple majors and advisers are assigned to handle multiple students, it would be an example of a ________ relationship.
answer
N:M relationship (many-many)
question
Which of the following is true about the database development process?
answer
NOT ON TEST
question
One of the procedures of a collaboration project is task status reporting. This is performed in the ________ phase of the project.
answer
NOT ON TEST
question
A byte is a ______.
answer
character of data
question
A collection of similar records is called a(n)________.
answer
Table or File
question
A ________ is a column or group of columns that identifies a unique row in a table.
answer
Key
question
Metadata are ________.
answer
Data that describe data
question
Which of the following is a program used to create, process, and administer a database?
answer
Database Management System (DBMS)
question
SQL is a(n) ________.
answer
International standard language for processing a database. All 5 of the DBMS products mentioned earlier accept and process SQL statements. "Structured Query Language"
question
________ are used to read, insert, modify, and delete data.
answer
Database Management Systems
question
DBMS products are broadly classified into ________.
answer
Enterprise DBMS and Personal DBMS
question
Entities have ________ that describe the characteristics of the entity.
answer
Attributes
question
Each entity in a database has a unique attribute called ________.
answer
Identifiers
question
In an entity-relationship diagram, a line between two entities represents a ________.
answer
Relationship
question
Minimum cardinalities are ________.
answer
Constraints on minimum requirements. What is the minimum number of entities required in a relationship?
question
________ is the process of converting a data model into tables, relationships, and data constraints.
answer
Database Design
question
________ is the process of converting a poorly structured table into two or more well-structured tables.
answer
Normalization
question
Every table in a normalized database has ________.
answer
Tables such that every table has a single topic or theme. Normalized tables do not have data integrity problems.
question
Which of the following statements is true about UTP cables?
answer
Most LAN connections are made using UTP cables (unshielded twisted pair). This cable contains sets of wires that are twisted together to improve signal quality. If connection carries a lot of traffic, UTP can be replaced by optical fiber cables.
question
A computer ________ is a collection of computers that communicate with one another over transmission lines.
answer
Network
question
A(n) ________ is a set of rules that two communicating devices follow.
answer
Protocol
question
The various computers and printers on a LAN are connected to a ________,which is a special-purpose computer that receives and transmits wired traffic on the LAN.
answer
Switch
question
The hardware component that connects a printer's circuitry to the network is called a(n) ________.
answer
Network Interface Card (NIC)
question
Which of the following statements is true for the TCP/IP protocol architecture?
answer
Scheme of 5 protocol types arranged in layers
Top Layer- protocols for applications like browsers and web browsers (program to program, enables communication amount programs) Ex: HTP, HTTPS, FTP, SMTP.
Next 2 Layers-Protocols about data communication across any internet (names are transport, internet) Reliable internet transport (TCP) and internet routing (IP)
Last 2 layers-Protocols containing data transmission within a network (names are network, two devices) Flow among switches/access points (IEEE 802.3 (wired) and IEEE 802.11 (wireless))
question
A(n) ________ is a piece of a message that is handled by programs that implement IP.
answer
Packet
question
A ________ is a worldwide-unique identification label that is affiliated with a public IP address.
answer
Domain Name
question
A(n) ________ uses the Internet or other internet to create the appearance of private, point-to-point connections.
answer
Virtual Private Network (VPN)
question
A ________ is a computing device that prevents unauthorized network access.
answer
Firewall
question
The IEEE 802.3 protocol standard is also known as ________.
answer
Ethernet
question
Which of the following statements is true about the IEEE 802.11 protocol?
answer
Wireless LAN connections use the IEEE 802.11 protocol. WNICs operate according to the 802.11 protocol, and connect to wireless access point. Transmitting data over short distances, wireless mice, keyboards, and cell phones.
question
IEEE 802.11g protocol allows speeds of up to ________.
answer
54 Mbps
question
Which of the following statements about LAN protocols is true?
answer
NOT ON TEST
question
Which of the following statements is true about access points?
answer
WNIC devices connect to access points. They are components of the LAN device that process wireless traffic and communicate with the wired switch. Every device on the LAN can communicate with every other device. Wireless devices communicate with each other via the access point.
question
Which of the following is a function of an ISP?
answer
A company that provides customers access to the internet. Provides legitimate internet address. Serves as gateway to internet. You pay for internet access. Alternatives for a WAN.
question
Which of the following is true of DSL modems?
answer
First modem type, stands for digital subscriber line. They operate on the same lines as voice telephones, but they operate so that their signals do not interfere with the voice telephone service. They do not interfere with telephone lines, so DSL data transmission and telephone conversations can occur simultaneously. Use own protocols for data transmission. Gradations of DSL service and speed. Most home DSL lines can download data at speeds ranging from 256 Kbps to 6.44 Mbps and can upload data of lower speeds
question
What is the performance guarantee offered by SDSL connections?
answer
Offer the same fast speed in both directions
question
The protocols used on the Internet are arranged according to a structure known as the ________ protocol architecture.
answer
TCP/IP
question
The IEEE 802.3 and 802.11 protocols ________.
answer
Operate at the bottom 2 layers. LAN device translates between both of them. Layer 1 (PHYSICAL), Scope is 2 devices, hardware specifications is their purpose.
question
The application layer of the TCP/IP protocol architecture ________.
answer
Layer 5 (top layer) with a program to program scope. Purpose is to enable communications amongst programs. Examples are: HTTP, HTTPS, SMTP, FTP
question
In which of the following cases is a user using the Internet, but not the Web?
answer
When you send a file using FTP, you are using the Internet, but not the web. Web browsers use HTTP and HTTPS, the other things (mail or files) dont use the web. Internet is no app layer.
question
Which of the following protocols guarantees a secure transmission?
answer
HTTPS, TCP
question
The ________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport.
answer
Transport or 4th layer
question
The primary protocol of the Internet layer of the TCP/IP protocol architecture is called ________.
answer
IP
question
Private IP addresses ________.
answer
Identify a particular device on a private network usually on a LAN. Their assignment is controlled with the LAN. Example: coffee shop gives you a private IP address on the LAN device.
question
Which of the following is true for private IP addresses?
answer
When your computer uses TCP/IP within a LAN, say to access a private web server with the LAN, it uses a private IP address. When you access a public site within the LAN, your traffic uses your internal IP address until it gets to the LAN device. At that point, the LAN device substitutes your private IP address for its public IP address and sends your traffic onto the internet. By using private IP addresses, you need not register a public IP address for your computer.
question
________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
answer
Web servers
question
A(n) ________ contains the URL of the Web page to find when the user clicks it.
answer
Hyperlink
question
The connection between the VPN client and VPN server is called a(n) ________.
answer
Tunnel
question
Which of the following is true about virtual private networks?
answer
NOT ON TEST
question
________ communications are secure, even though they are transmitted over the Internet.
answer
VPN
question
A(n) ________ firewall examines each part of the message and decides whether it will let that part pass through to the network.
answer
Packet-Filtering
question
Packet-filtering firewalls perform all of the following except ________.
answer
This is what they actually do: Examine each part of a message and determine whether to let it pass. Examine the source address, the destination address, and other data. Can prohibit outsiders from starting a session with any user behind the firewall. Disallow traffic from particular sites, such as known hacker addresses. Can prohibit traffic from legitimate, but unwanted addresses, such as competitor's computers. Keep employees from accessing specific sites, such as competitor sites, sites with pornographic material, or popular news sites.