Quiz 3 &4 – Flashcards
48 test answers
Unlock all answers in this set
Unlock answers 48question
**_______consists of the random access memory, cache memory and the read only memory which is directly accessible to the CPU, and a(n)________ consists of equipment designed to store large volumes of data for long-term storage.
answer
Primary storage, secondary storage
Unlock the answer
question
*Which of the following technologies is being used to replace the older electronic data interchange (EDI) for specifying data standards?
answer
Extensible markup language (XML)
Unlock the answer
question
**Inventory data for your company contains product name (20 possible ASCII characters) and product description (40 possible ASCII characters). Unused positions in these two fields are padded with blanks. At any given point, you can have as many as 200,000 different products in inventory. Your IS manager has requested funding to purchase an * Megabyte hard drive to store this data. What do you tell her?
answer
The 8 Megabyte hard drive is not big enough
Unlock the answer
question
The best definition of "moore's law" is..
answer
chip performance per dollar doubles every 18 months
Unlock the answer
question
_____ is a language used to create and manipulate databases
answer
SQL
Unlock the answer
question
*Virtualization refers to
answer
A compartmentalized server that can run multiple instances of an operating system as if it were multiple computers
Unlock the answer
question
COB students currently have access to Citrix's XenApp service (myapps.niu.edu), which they can use to run software on their computers even though they have not nstalled it. Which of the following might be a problem with this example of on-demand software?
answer
the XenApp service level may not always be adequate relative to using regular software
Unlock the answer
question
What is Object Oriented Programming (OOP) analogous to?
answer
Copy and Paste
Unlock the answer
question
****After reading about NIU quarterback recently breaking a 48-year-old school touchdown record, you can recommend the article on facebook directly from ESPN's website. You are able to do this because ESPN can communicate with Facebook via its
answer
Application Programming Interface (API)
Unlock the answer
question
Cloud computing refers to...
answer
replacing computing resources with services provided over the internet
Unlock the answer
question
What problem is faced by multicore processors running older software written for single-brain chips?
answer
Multicore processors usually run older software by using only one core at a time
Unlock the answer
question
**This code costs an estimated $30 Billion annually to main
answer
Existing FOrtune 1000 COBOL
Unlock the answer
question
The software business is extremely profitable compared to the hardware business because..
answer
The marginal cost of software products is effectively zero
Unlock the answer
question
*Open-source software (OSS) is said to be scalable and agile. This means...
answer
The source code can be modified for different sized projects and decrease the time to market for different products
Unlock the answer
question
Which of the following is not an input device?
answer
Standard monitor
Unlock the answer
question
Which of the following statements regarding the current electronic waste scenario is true?
answer
electronic waste increases with the rise of living standards worldwide
Unlock the answer
question
A 640 bit chip can process
answer
8 bytes in a single machine cycle
Unlock the answer
question
Writing software is easier for people if they use a(n)_______ and more efficient for the computer if they use a(n)________.
answer
High level language.....low level language
Unlock the answer
question
How many bits are in a byte?
answer
8 bits in a byte.
Unlock the answer
question
**Which of the following statements relating to open source software is true?
answer
The flagship OSS product is the Linux operating system, now available on all scales of computing devices
Unlock the answer
question
One advantage and one disadvantage of using SaaS are
answer
access to a variety of sotfware without installng it and potentially losing access or data if the provider goes out of business
Unlock the answer
question
What is SaaS?
answer
Software as a Service
Unlock the answer
question
According to our in-class presenters, which of the following is NOT currently a means of biometric identification?
answer
Temperature
Unlock the answer
question
Which of the following is an example of biometric authentication?
answer
The fingerprint reader found on many new laptops
Unlock the answer
question
According to our in-class presenters, and also the Q&A session, what is the rpice range of an electronic nose?
answer
$5,000-$100,000
Unlock the answer
question
The hypertext transfer protocol (http) defines the communication between..
answer
Web browsers and web servers
Unlock the answer
question
Cybersquatting is defined as
answer
registering a domain name in order to profit from a firm name or trademark
Unlock the answer
question
**Complete the analogy- http: browser and server communication; html: ____
answer
Create and format web pages
Unlock the answer
question
"Modulate"/ "Demodulate" means to covert ___ to ____ and back
answer
Digital to Analog
Unlock the answer
question
It should be evident from the TJX example that....
answer
information security must be a top organizational priority
Unlock the answer
question
**What connects network devices over a relatively short distance, such a a building or a campus?
answer
LAN
Unlock the answer
question
LAN is? WAN is? MAN is? GAN is?
answer
Local Area Network Wide Area Network Metropolitan Area Network Global Area Network
Unlock the answer
question
Of those regularly used, what is the more INEFFECTIVE form of authentication?
answer
User ID and Password
Unlock the answer
question
A Virtual Private Network is a private ____ that uses the Internet as a low-cost ____ backbone to transport data between two or more geographically separate sites
answer
WAN : WAN
Unlock the answer
question
The three primary technology-based security areas are ________.
answer
Detection and Response; Authentication and Authorization; & Prevention and Resistance
Unlock the answer
question
A firewall is________
answer
hardware and/or software that quards a private network by analyzing the information entering and leaving a network
Unlock the answer
question
Internet firm Amazon.com selling books directly to consumers is an example of ______ e-business, while companies purchasing Amazon's cloud computing services is an example of _____ e-buiness.
answer
B2C; B2B
Unlock the answer
question
A research scientist with a major pharmaceutical firm in New Jersey is caust passing on sensitive information, worth millions of dollars, regarding the compoition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?
answer
Corporate espionage
Unlock the answer
question
Michigan quarterback recently had his Twitter account hacked because he failed to take appropriate security precaustions, such as using a high-quality password. what security principal does this illustrate?
answer
information security is moer of a people issue than a technical issue
Unlock the answer
question
Which technologies are available to prevent and build resistance to attacks?
answer
Content Filtering, ENcryption, firewalls
Unlock the answer
question
What is encryption?
answer
Scrambling information into an alternative form that needs a key/password to decrypt
Unlock the answer
question
***DDoS stands for ________ and is an attack intended to _______.
answer
Distributed denial of service; crash a website by overwhelming it with messages
Unlock the answer
question
An SQL injection technique exploits what weakness of Web sites to launch attacks
answer
Sloppy programming practices where software devlopers do not validate user input
Unlock the answer
question
Look at the grap on quiz 4 to fill in the blanks
answer
:)
Unlock the answer