click below
click below
Normal Size Small Size show me how
Test 2 -MIS
MIS
| Question | Answer |
|---|---|
| ____ is a collection of related data that is stored inb a central location or in multiple locations | database |
| ____ the structure and organization of data which involves fields, records and files | data hierarchy |
| ____ is software for creating, storing, maintaining and accessing database files. | database management system |
| ___ makes using databases more eficient | DBMS (Database managemebt system) |
| ___ alll files are integrated, meaning information can be linked | database |
| is a critical component of informtaion systems because any type of analysis that is done is based on data available in the ___ | database |
| ___ are a series of files where data use to be stored; not arranged in a hierarchy; no relationship among these files | flat files |
| what is the problem with flat files? | redundancy |
| what are some advantages of databases | 1.info generated from same data 2.complex handled easily 3.redundancy is eliminated 4.programs and data independent 5.data management improved 6.data easily maintained 7.less storage space |
| records in files are organized and processed in numerical or sequantial order, typically the order in which they were entered | sequential access files structure |
| records can be accessed in any order regardless of their physical locations in storage media. | random access file structure |
| ____ records can be accessed sequentially or randomly, depending on the number being accessed | indexed sqeuential access method (ISAM) |
| _____ fast and effective when a small number of records need to be processed daily or weekly. | random access file structure |
| ___ involves how data is stroed on the retrieved from storage media, such as hard disks, magnetic tapes or CDs | physical views |
| _____ involves how information appears to users and how it can be organizedand retrieved | logical view |
| ____ determines how data is created, represented, organized and maintained. | data model |
| ____ describes how data is organized and the relationship among records | data structure |
| ____ describes methods calculations that can be performed on data, such as updating a querying data | operations |
| ____ defines the boundariesof a database such as maximum and minimum values allowed for a fields constraints and access methods | integrity rules |
| the relationships between records form a treeline structure | hierachial model |
| ___ are called nodes | records |
| relationships betwen records are called ___ | branches |
| the node at the top is called ___ | root |
| ____ is similar to hierachical model, but records are organized differently; every record can have multiple parent and child records | network model |
| ___ uses two-dimensional table of rows and columns of data. | relational model |
| ___ are called records | rows |
| ___ are called fields | columns |
| ___ stores definitions such as data types for fields, default values, and validation rules for data in each field | data dictionary |
| ____ uniquely identifies every record in a relational database | primary key |
| is a field in a relational table that matches the primary key column of anoter table. | foregin key |
| ____ improves database efficency by eliminating redundant data and ensuring that only related data is storedin a table | normalization |
| _____ the heart of a DBMS software, responsible for data storage, manipulation, and retrieval | database engine |
| ____ creates and maintains the data dictionary and define the structure of files in a database | data definiation |
| _____ is a stanard 4th generation query language used by many DBMS packages | SQL |
| _____ you request data from a database by constructing a statement made up of query forms | query by example |
| ___refers to the range of functions that data administators determine who has permission to perform certain functions | CRUD (Create, read, updata, delete) |
| ____ found in large organizations, design and ser up databases, establish security | Database management system |
| _____ acts as an interface to a database, retieving data from users and allowing users to enter data in the database. | data-driven web site |
| ____ stores data on multiple servers throughout an organization | DDBMS (Distributed database management system) |
| approach to a distributed DBMS addresses how tables are divided among multiple locations. | fragmentation |
| approach to a distributed DBMS has each site store a copy of the data in the organization's database | replication |
| ____ approach to a distributed DBMS combines fragmentation and replication, with each site storing the data it uses most often | allocation |
| _____ Both data and their relationships are contained in a single object. | object oriented databases |
| ____ refers to the grouping into a class of various objects along with their attributes and methods | encapsulation |
| ____ refers to new objects being created faster and more easily by entering new data attributes | inheritance |
| _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence | data warehouse |
| ____ the process used in a data warehouse | extraction, transformation and loading (ETL) |
| ____ used to facilitate and manage transaction-oriented application | online transaction process (OLTP) |
| ____ generates business intelligance | online analytical processing (OLAP) |
| _____ is used to discover patterns and relationships | data-mining analysis |
| is usually a smaller version of a data warehouse | data mart |
| ____ uses data statistical methods to gain insight into the data and provide decision makers with info they can act on | business analytics (BA) |
| ___ data so volume that conventional computing methods are not able to efficiently process and manage it | big data |
| ___ is software that is secretly gathers info about users while they browse the web | spyware |
| ___ is a form of spyware that collects info about the user (without the user's consent) to determine which advertisements to display in the user's web browser | adware |
| sending fraudulent emails that seem to come from legitimate sources, such as a bank or university | phishing |
| ____ is directing internet users to fraudulent websites with the intention of stealing their personal information | pharming |
| ____ monitor and record keystrokes and can be software or hardware devices | keystroke loggers |
| ____ is capturing and recording network traffic | sniffing |
| ____ an attempt to gain access to a network by posing as a authorized user in order to find sensitive information | spoofing |
| ____ the unauthorized use of computer data for personal gain | computer fraud |
| ____ means that a system must prevent disclosing information to anyone who is not authorized to access it | confidentiality |
| refers to the accuracy of information resources within an organization | integrity |
| means that computers and networks are operating and authorized users can access the information they need | availability |
| ____ ensure availability in the event of a system failure by using a combination of hardware and software | fault tolerant systems |
| ____ consists of self-propagating program code that is triggered by a specified time or event | virus |
| travels from computer to computer in a network, but does not erase the data | worm |
| ____ contains code intended to disrupt a computer, network or website, usually hidden inside a popular program | trojan program |
| ____ type of Trojan program used to release a virus, work or other destructive code. | logic bomb |
| ____ also called a trapdoor; a programming routine built into a system by its designer or programmer | backdoor |
| is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks | blended threat |
| attack floods a network or server with service requests to prevent legitimate user's access to the system | denial of service (DoS) |
| ____using "people skills" to trick others into revealing private information | social engineering |
| uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passes on to others | biometric security measures |
| ____ verifies whether a users access is valid by logging the user off and the calling the user back at a predetermined number | callback modem |
| a combination of hardware and software that acts as a filter or barrier between a private network and external computer or network including the internet | firewall |
| _____ can protect against bother external and internal acccess | intrusion detection system |
| ____ primary control access to computers and networks, and they include devices for securing computers and peripherals from theft | physical security measures |
| ____ designed to protect systems from unauthorized access in order to preserve data integrity | access controls |
| ____ is a combination of numbers, characters and symbols that is entered to allow access to a system | password |
| ____ provides a secure "tunnel" through the internet from transmitting messages and data via a private network | virtual private network (VPN) |
| ____ transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others | data encryption |
| ____ is a commonly used encryption protocol that manages transmission security on the internet | secure sockets layer (SSL) |
| ____ a crytopgraphic protocol that ensures data security and integrity over public networks such as the internet | transportation layer security (TLS) |
| ___ enables users of a public network such as internet to securely and privately exchange data through the use of a pair of keys | PKI (public key infrastructure) |
| ___ uses two keys; public key known to everyone and a private key only known to the recipient | asymmetric encryption |
| ____ called secret key encryption; the same key is used to encrypt and decrypt the message | symmetric encryption |
| ___ outlines procedures for keeping an organization operational in the event of a natural disaster or network attack. | business continuity planning |
| _____ electronic transfer of data from one location to another | data communication |
| _____ the amount of data that can be transferred from one point to another in a certain time period, usually one sec | bandwidth |
| ____ is the loss of power in a signal as it travels from the sending device to the receiving device | attenuation |
| ____ data transmission, multiple places of data are sent simultaneously to increase the transmission rate | broadband |
| ___ is a voice-grande transmission channel capable of transmitting a maximum of 56,000bps, so only a limited amount of information can be transferred in a specific period of time | narrowband |
| ____ are rules that govern data communication, including error detection, messages length and transmission speed | protocols |
| ___ is a device that connects a user to the internet | modem |
| ____ common carrier service is a high-speed service that uses ordinary phone lines | digital subscriber line (DSL) |
| ____ channels, connect sender and receiver devices (conducted or radiated) | communication media |
| ___ provide physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable and fiber optics | conducted media |
| uses an antenna for transmitting data through air or water | radiated media |
| ___ system all processing is done at one central computer | centralized processing |
| ___ each user department or division has its own computer (called organizational unit) for performing processing tasks | decentralized processing |
| maintains centralized control and decentralized operations (power distributed among several locations) | distributed processing |
| ____ is a seven-layer architecture for defining how data is transmitted from computer to computer in a network | OSI model (open system interconnect) |
| ___ is hardware component that enables computer to communicate over a network | network interface card (NIC) |
| ____ connects workstations and peripheral devices that are in close proximity | LAN |
| ____ can span several cities, states or even countries, it usually owned by several different parties | WAN |
| ____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well | MAN |
| ___ represents a network's physical layout, including the arrangement of computers and cables | network topology |
| usually consists of a central computer and a series of nodes | star topology |
| __ no host computer is required because each computer manages its own connectivity | ring topology |
| _____ connect nodes along a network segment, but the ends of the cable are not connected, as they are in a ring | bus topology |
| combines computers with different processing strengths in different organizational levels | hierarchical topology |
| ____ is hardware and software device that controls data transfer from a computer to a peripheral device | controller |
| ___ is hardware device that allows several nodes to share one communication channel | mulitplexer |
| ___ every node is connected to every other node | mesh topology |
| is an industry standard suite of communication protocols that enables interoperability | TCP/IP |
| ___ is a collection of binary digits sent from computer to computer over a network | packet |
| is the process of deciding which path to take on a network | routing |
| generated automatically by software, is used to determine the best possible route for a packet | routing tables |
| ___ one node is in charge of selecting the path for all packets | centralized routing |
| ___ relies on each node to calculate its own best possible route. | distributed routing |
| ___ a network connection device containing software that connect network systems and control traffic flow between them | router |
| ___ requires the network routing manager to give it information about which addresses are on which network | static router |
| ___ can build tables that identify addresses on each network | dynamic router |
| ____ software runs on the local computer and communicates with the remote server to request information or services | client/server model |
| a client communicates directly with the server (most common type) | two-tier architecture |
| ___ attempts to balance the workload between client and server by removing application processing from both the client and server and placing it on a middle-tier server | n-tier architecture |
| is a network that uses wireless instead of wired technology | wireless network |
| ___ network operating on a radio frequency consisting of radio cells | mobile network |
| ____ is similar to bandwidth. (the amount of data transferred or processed in a specified time) | throughput |
| divides each channel into six slots | Time division multiple access (TDMA) |
| ___ transmits multiple encoded messages over a wide frequency and then decodes them at the receiving end. | code division multiple access (CDMA) |
| ____ integrating voice, video, and data so that multimedia information can be used for decision making | convergence |
| forms, reports, queries, and other programs that users interact with to manipulate a database When you work with a database in most daily situations you are accessing it through an application program | database applications |
| Collected by the organization using its business processes Can be a source of competitive advantage | private data |
| Collected by someone else using their processes Some is free and some must be purchased By itself not a source of competitive advantage | public data |
| 3 V’s of Data | (Volume, Variety, and Velocity) |
| 5 basic operations in reporting | Sorting, Grouping, Calculating, Filtering, Formatting |
| An OLAP report may also be called an | OLAP Cube; because of the way it displays data across multiple axes |
| wireless local area network that uses radio waves and the IEEE 802.11 standard for communication | Wifi |
| Uses ground-based towers | WiMax |
| what is the consequence of Voice over IP | If the computer network goes down telephone service is also lost |
| is a type of malware that allows an attacker to take control over an affected computer. | bot |
| ____ is a worldwide collection of millions of computers and networks of all sizes (network of networks) | internet |
| ____ project started in 1969 by the US department of defense (beginning of internet) | ARPANET -Advanced Research Projects Agency Network |
| ___ the foundation network linked with fiber-optic cables that can support very high bandwidth | internet backbone |
| documents include embedded references to audio, text, images, video, and other documents | hypermedia |
| ____ embedded references in hypermedia documents | hypertext |
| information is transferred from one network to another, domain names are converted to IP addesses by ___ | DNS |
| ___ is the address of a document or site on the internet | URL (uniform resource locators) |
| is the language used to create Web pages. | HTML |
| used to travel from website to website "surf" the internet | navigational tools |
| examples are Google, Ask.com, Yahoo -used to retrive data from the Web by using search terms | search engine |
| are indexes of information based on keywords embedded in documents -engines find what they are looking for | directories |
| are usually for exchanging opinions and ideas on a specific topic, usually of a technical or scholarly nature. | discussion groups |
| are typically more general in nature and can cover any topic | newsgroups |
| enables users in chat rooms to exchange text messages with people with in other location in real time | internet relay chat IRC |
| a service for communicating with others via a private "chat room" | IM |
| using the internet rather than the telephone network to exchange spoken conversations | Internet telephony |
| is the protocol used for Internet telephony | VoIP |
| a network within an organization that uses internet protocols and technologies | intranet |
| a secure network that uses the internet and web technologies to connect intranets of business partners so communication between organizations or between consumers | extranet |
| a journal or newsletter that is updated frequently and intended for the general public blogs | blog |
| a type of website that allows users to add, delete, and sometimes modify content | wiki |
| refers to a broad class of web sites and services that allows users to connect with freinds, familly, colleagues online as well as meet prople with similar interests | social networking |
| are a fast, easy way to distribute Web content in Extensible Markup Language format | RSS (really simple syndictation) feeds |
| an electronic audio files, such as an MP3 that is posted on a web for users to download to their mobile devices | podcast |
| is a collaborative effort involving more than 200 US universities and corporations to develop advance internet techonologies and applications for higher education and academic research | Internet2 (I2) |
| a local connection point-to-presence that connects a variety of high-performance networks and ts main function is the exchange of 12 traffic with a specified bandwidth | gigapop |
| refers to a web-based development in which people, processes, data and things are interconnected via the internet using various means such as RFID | internet of Everything (IoE) |
| refers to the physical object that are connected to the internet and , therefore to all the other physical objects | internet of things (IoT) |
| is one that, when introduced, either radically transforms markets, creates wholly new markets or destroys existing markets for other technologies | distruptive technology |
| ____ project is first publicized which created standards for communication over the Internet (HTTP, URL, HTML) | World Wide Web |
| Person to person messaging and document sharing | |
| Interactive conversations in the form of text | Internet Relay Chat (IRC) |
| Discussion groups on electronic bulletin boards | UseNet (Newsgroups) |
| Remote access to a computer | telnet |
| Transferring files from computer to computer | FTP |
| Retrieving, formatting, and displaying information including text, graphics, audio, and video using hypertext links | WWW |
| Difference between the early web 1.0 and the Social web 2.0? | 1.0: one way communication, static, accessed only though desktops/laptops, individual users, data single sources 2.0: two way communication, dynamic, user-controlled content, user communities, enhance user activity, data from multiple sources |
| example of a microblog? |