Chapters 10-12

Unlock all answers in this set

Unlock answers
question
data is a collection of unprocessed items, which can include text, numbers, images, audio, and video 514
answer
true
question
a database management system allows users to create forms and reports from the data in the database 530
answer
true
question
a range check ensures users enter only numeric data in a field 523
answer
false - range check determines whether a number is within a specified range
question
a check digit often confirms the accuracy of a primary key value 523
answer
true
question
databases require less memory, storage, and processing power than a file processing system 526
answer
true
question
a report is a window on the screen that provides areas for entering or modifying data in a database 530
answer
false - a data entry form, is a window on the screen that provides areas for entering or modifying data in a database
question
continuous backup is a backup plan in which all data is backed up whenever a change is made 532
answer
true
question
a relationship is a link within the data in a database 533
answer
true
question
normalization is a process designed to ensure the data within the relations (tables) is duplicated so that it is not lost 534
answer
false - it is a process designed to ensure the data contains the Least amount of duplication
question
the data in a distributed database exists in many separate locations throughout a network or the Internet 536
answer
true
question
___ information has an age suited to its use 516
answer
timely
question
in some tables, the primary key consists of multiple fields, called a ___ 519
answer
composite key
question
___ procedures include adding records to , modifying records in, and deleting records from file 520
answer
file maintenance
question
a range check ___ 523
answer
determines whether a number is within a specified range
question
all of the following are strengths of the database approach, except ___ 525
answer
less complexity
question
because the ___ contains details about data, some call it metadata 528
answer
data dictionary
question
many organizations adopt the ___ policy, where users' access privileges are limited to the lowest level necessary to perform required tasks 531
answer
principle of least privileged
question
the database analyst (DA) ___ 538
answer
focuses on the meaning and usage of data
question
field name 518
answer
uniquely identifies each field
question
field size 518
answer
defines the maximum number of characters a field can contain
question
data type 518
answer
specifies the kind of data a field can contain and how the field is used
question
primary key 519
answer
is a field that uniquely identifies each record in a file
question
query language 528
answer
consists of simple English-like statements that allow users to specify the data to display, print, or store
question
log 532
answer
a listing of activities that modify the contents of the database...
question
recovery utility 532
answer
uses the logs and/or backups to restore a database when it becomes damaged or destroyed...
question
GIS (534)
answer
(geographic information system) database stores maps and other geographic data
question
data modeler 538
answer
focuses on the meaning and usage of data...
question
database administrator 538
answer
requires a more technical inside view of the data...
question
not all breaches to computer security are planned 556
answer
true
question
the term, cyberwarfare, describes an attack whose goal ranges from disabling a government's computer network to crippling a country 557
answer
true
question
many methods exist to guarantee completely a computer or network is safe from computer viruses and other malware 560
answer
false - methods that guarantee a computer or network is safe from computer viruses and other malware simply do not exist
question
cybercriminals install malicious bots on unprotected computers to create a zombie army 562
answer
true
question
a honeypot is a computer that is isolated and, therefore, immune to attach 564
answer
false - it is a vulnerable computer that is set up to entice an intruder to break into it
question
bio-metric payment involves a customer's fingerprint being read by a fingerprint reader that is linked to a payment method such as a checking account or credit card 568
answer
true
question
some businesses use a real time location system (RTLS) to track and identify the location of high-risk or high-value items 570
answer
true
question
a program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes 571
answer
true
question
a digitial signature is a mathematical formula that generates a code from the contents of the message 574
answer
false - it is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender
question
digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content 582
answer
true
question
green computing involves reducing the electricity while using a computer, but the practice increases environmental waste 583
answer
false - it involves reducing the electricity and waste
question
a ___ is a program that hides in a computer and allows someone from a remote location to take full control of the computer 558
answer
trojan horse
question
malware is a term that can be used to describe ___ 558
answer
programs that act without a user's knowledge and deliberately alter the computer's operations
question
a ___ is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail 562
answer
denial of service attack
question
___ involves the examination of computer media, programs, data and log files on computers, servers, and networks 569
answer
digital forensics
question
physical access controls, such as locked doors and windows, usually are adequate to protect against ___ 570
answer
theft and vandalism
question
a(n) ___ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext 573
answer
encryption algorighm, or cypher
question
some organizations continually review their ___ 583
answer
(PUE) power usage effectiveness
question
as related to the use of computers, ___ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others 590
answer
social engineering
question
virus 558
answer
a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission
question
trusted source 560
answer
an organization or person you believe will not send a virus infected file knowingly
question
quarantine 561
answer
a seperate area of a hard disk that holds the infected file until the infection can be removed
question
botnet 562
answer
a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other neworks, usually for nefarious purposes
question
spoofing 563
answer
occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source
question
personal firewall 564
answer
is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
question
passphrase 566
answer
a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
question
encryption algorithm 573
answer
a set of steps that can convert readable plaintext into unreadable ciphertext
question
biometric device 568
answer
authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic
question
surge protector 576
answer
uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over -voltage from reaching the computer
question
an information system supports daily, short-term, and long-range activities of systems analysts 620
answer
false - supports daily, short-term, and long-range activities of users
question
a systems analyst is responsible for designing and developing an information system 622
answer
true
question
operational feasibility measures whether an organization has the hardware, software, and people needed to support a proposed information system 624
answer
false - measures how well the proposed information system will work
question
documentation should be updated only after a project is complete 625
answer
false - it should be updated regularly and be an ongoing part of system development
question
in detailed analysis, the systems analysts developed the proposed solution with a specific hardware or software in mind. 631
answer
false - developed without any hardware or software in mind
question
structured English is a style of writing that describes the steps in a process 633
answer
true
question
object modeling combines the data with the processes that act on that data into a single unit, called a method 634
answer
false - the single unit is called an object
question
the only major activity of the design phase is the development of all of the details of the new or modified information system 638
answer
false - there are two major activities the other one is acquiring the necessary hardware and software
question
some VARs provide complete systems, known as a turnkey solution 639
answer
true
question
during program design, the systems analyst prepares the program specification package, which identifies the required programs and the relationship among each program, as well as the input, output, and database specifications 641
answer
true
question
with a pilot conversion, multiple locations in the organization use the new system 644
answer
false - only one location uses it so it may be tested
question
___ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project 623
answer
true
question
a ___ analyzes the time required to complete a task and identifies the minimum time required to an entire project 624
answer
PERT chart
question
in larger organizations, users write a formal request for a new or modified information system, which is called a ___ 626
answer
request for system services
question
during the planning phase, the projects that receive the highest priority are those ___ 628
answer
mandated by management
question
a(n) ___ lists a variety of conditions and the actions that correspond to each condition 633
answer
decision table
question
the purpose of the ___ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project 635
answer
system proposal
question
___ tools are designed to support one or more activities of system development 642
answer
(CASE) computer-aided software engineering
question
a(n) test is performed by end-users and checks the new system to ensure that it works with actual data 644
answer
acceptance test
question
system developer 623
answer
responsible for designing and developing an information system
question
project manager 623
answer
contols the activities during system developement
question
request for system services 626
answer
a formal requestfor a new or modified information system
question
process modeling 631
answer
is an analysis and design technique that describes processes that transform inputs into outputs
question
project dictionary 633
answer
contains all the documentation and deliverables of a project
question
data dictionary 634
answer
stores the data item's name, description, and other details about each data item
question
object 634
answer
an item that can contain both data and the procedures that read or manipulate that data
question
packaged software 635
answer
is mass-procduced, copyrighted, prewritten software available for purchase
question
prototype 641
answer
a working model of the proposed system
question
performance monitoring 645
answer
determine whether the system is inefficient or unstable at any point
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New