IS 201 Midterm

25 July 2022
4.7 (114 reviews)
80 test answers

Unlock all answers in this set

Unlock answers (76)
question
Which of the following is an advantage of Worldwide Interoperability for Microwave Access (WiMAX)? a. It incurs low costs. b. It is fast and easy to install. c. It requires little power. d. It is unaffected by weather conditions.
answer
b. It is fast and easy to install.
question
CD-ROMs and DVDs are examples of _____. a. magnetic disks b. magnetic tapes c. main memory devices d. optical discs
answer
d. optical discs
question
In the context of virtual reality (VR) technology, the main technology used in an exocentric environment is _____. a. QR code b. nanotechnology c. WiMAX d. 3D graphics
answer
d. 3D graphics
question
To begin designing a relational database, one must define the _____ by defining each table and the fields in it. a. physical structure b. foreign key c. logical structure d. primary key
answer
c. logical structure
question
A _____ is the software that acts as an intermediary between two systems. a. backdoor b. proxy server c. Trojan program d. database
answer
b. proxy server
question
The purpose of an information system's _____ component is generating the most useful type of information for making decisions. a. external data b. database c. internal data d. process
answer
d. process
question
A(n) _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background. a. QR (quick response) code b. telepen code c. radio frequency identification (RFID) tag d. latent image barcode
answer
a. QR (quick response) code
question
In a data warehouse, _____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing. a. loading b. transformation c. extraction d. aggregation
answer
c. extraction
question
Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key? a. Codetext b. Plaintext c. Ciphertext d. Cleartext
answer
c. Ciphertext
question
In the context of virtual reality (VR) technology, _____ refers to allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds. a. networked communication b. interaction c. full-body immersion d. telepresence
answer
a. networked communication
question
Managers could use a _____ to assess the effect on final product costs of a nine percent increase in raw materials. a. financial information system b. human resource information system c. marketing information system d. manufacturing information system
answer
d. manufacturing information system
question
A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. a. expansion slot b. control unit c. serial port d. parallel port
answer
d. parallel port
question
Online brokerage firms operate in a highly combative and ambitious environment, so they use information technologies to make their services more unique in order to combat _____. a. supplier power b. rivalry among existing competitors c. buyer power d. the threat of new entrants
answer
b. rivalry among existing competitors
question
Worldwide Interoperability for Microwave Access (WiMAX) is designed for wireless _____. a. metropolitan area networks (MANs) b. local area networks (LANs) c. wide area networks (WANs) d. personal area networks (PANs)
answer
a. metropolitan area networks (MANs)
question
In a(n) _____ data model, each record can have multiple parent and child records. a. operations b. hierarchical c. network d. relational
answer
c. network
question
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. a. backdoor b. phishing c. denial-of-service d. social engineering
answer
c. denial-of-service
question
In a(n) _____ file, each alphabetic, numeric, or special character is represented with a 7-bit binary number. a. ASCII b. EBCDIC c. Unicode d. extended ASCII
answer
a. ASCII
question
A write once, read many (WORM) disc is a common type of _____. a. read-only memory (ROM) b. magnetic storage c. random access memory (RAM) d. optical storage
answer
d. optical storage
question
The _____ of a data model defines the boundaries of a database, such as maximum and minimum values allowed for a field. a. operations b. file structure c. integrity rules d. data structure
answer
c. integrity rules
question
Microsoft Access is an example of _____ in an information system. a. external data b. knowledge base management system c. internal data d. database management system
answer
d. database management system
question
A(n) _____ is often used, so remote users have a secure connection to an organization's network. a. terminal resource network b. intrusion detection system c. biometric security system d. virtual private network
answer
d. virtual private network
question
Data in a data warehouse can be differentiated from data in a database in that the former _____. a. is used for capturing and managing transactions b. only keeps recent activity in memory c. is focused on a specific area d. captures raw transaction data
answer
c. is focused on a specific area
question
A _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. a. data pattern b. data warehouse c. data mine d. data dictionary
answer
b. data warehouse
question
The _____ component of a virtual reality (VR) system is an input device that captures and records movements of a user's feet as the user turns in different directions. a. fuzzy logic b. kernel c. crawler d. walker
answer
d. walker
question
Data warehouses are sometimes called "hypercubes" because they_____. a. are function oriented b. capture raw transaction data c. store multidimensional data d. manage transactions
answer
c. store multidimensional data
question
The _____ component is responsible for data storage, manipulation, and retrieval. a. data definition b. data administration c. database engine d. application generation
answer
c. database engine
question
Which of the following is considered an intentional security threat? a. Backdoors b. A user's accidental deletion of data c. Floods d. Power outages
answer
a. Backdoors
question
The most common technology used with an egocentric virtual environment is _____. a. software as a service (SaaS) b. nanotechnology c. a head-mounted display (HMD) d. 3D graphics
answer
c. a head-mounted display (HMD)
question
An advantage of silicon over gallium arsenide is that: a. it is less fragile than gallium arsenide. b. it emits light, whereas gallium arsenide does not. c. it survives much higher doses of radiation than gallium arsenide. d. it withstands higher temperatures than gallium arsenide.
answer
a. it is less fragile than gallium arsenide
question
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it. a. validity b. confidentiality c. integrity d. availability
answer
b. confidentiality
question
Read-only memory (ROM) is different from random access memory (RAM) in that: a. it is nonvolatile memory. b. it is volatile memory. c. it is a secondary memory. d. it is a read-write memory.
answer
a. it is nonvolatile memory.
question
_____ are an external data source of an information system. a. Personnel records b. Inventory reports c. Sales records d. Labor statistics
answer
d. labor statistics
question
The _____ view of a database involves how data is stored on and retrieved from storage media. a. logical b. physical c. analytical d. rational
answer
b. physical
question
In grid computing, each participant in a grid is referred to as a _____. a. branch b. node c. cell d. tag
answer
d. tag
question
Which of the following is a type of access control used to protect systems from unauthorized access? a. Passwords b. Firewalls c. Identification badges d. Steel encasements
answer
a. Passwords
question
Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____. a. nanoscale b. nanobyte c. nanometer d. nanoframe
answer
a. nanoscale
question
The variety dimension of big data refers to a combination of _____. a. raw data and metadata b. structured data and unstructured data c. data definition and data manipulation d. data warehouse and data mart
answer
b. structured data and unstructured data
question
The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. a. application generation b. data manipulation c. data definition d. data administration
answer
c. data definition
question
Which of the following is a nonbiometric security measure? a. Passwords b. Electronic trackers c. Firewalls d. Signature analysis
answer
c. Firewalls
question
In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options. a. prospect b. user c. supplier d. buyer
answer
c. supplier
question
Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data? a. File structure b. Integrity rules c. Data structure d. Operations
answer
d. Operations
question
Which of the following is a biometric security measure? a. Signature analysis b. Firewalls c. Electronic trackers d. Passwords
answer
a. Signature analysis
question
In a relational data model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria. a. join b. find c. select d. insert
answer
c. select
question
Which of the following issues is faced by application service providers (ASPs)? a. Compatibility issues b. Inflexibility c. Lack of portability d. Privacy issues
answer
d. Privacy issues
question
_____ is one of the strategies of Michael Porter's three strategies for successfully competing in the marketplace. a. Groupthink b. Emotion c. Focus d. Simulation
answer
c. Focus
question
A level 2 security system protects _____. a. Web servers b. e-mail servers c. corporate networks d. back-end systems
answer
d. back-end systems
question
A logic bomb is a type of _____. a. blended threat b. backdoor c. worm d. Trojan program
answer
d. Trojan program
question
Extended ASCII data code allows representation of _____ characters. a. 1042 b. 265 c. 1024 d. 256
answer
d. 256
question
A level 3 security system focuses on protecting _____. a. front-end servers b. corporate networks c. users' work stations d. back-end systems
answer
b. corporate networks
question
One of the disadvantages of silicon is that: a. it cannot emit light. b. it is very soft and fragile. c. it cannot be used for mass production of silicon devices. d. it is very expensive.
answer
a. it cannot emit light
question
In designing a management information system, the first task is to define the system's _____ clearly. a. hardware components b. users c. objectives d. database
answer
c. objectives
question
The _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. a. data administration b. data manipulation c. data definition d. application generation
answer
a. data administration
question
Transistors were the major technology used during the _____ generation of computers. a. fourth b. third c. second d. first
answer
c. second
question
_____ are usually placed in front of a firewall and can identify attack signatures and trace patterns. a. Intrusion detection systems b. Biometric security measures c. Physical security measures d. Proxy servers
answer
a. Intrusion detection systems
question
Java and C++ are _____ languages. a. assembly b. second-generation computer c. machine d. high-level
answer
d. high-level
question
A typical PDA includes a(n) _____. a. calendar b. external monitor c. external keyboard d. mouse
answer
a. calendar
question
The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes. a. volume b. velocity c. viscosity d. variety
answer
a. volume
question
Which of the following technologies could be used to prevent one coworker from checking in for another in an organization? a. Bluetooth b. Grid computing c. Biometrics d. Nanotechnology
answer
c. Biometrics
question
A level 1 security system is used to protect _____ against unauthorized access. a. corporate networks b. users' work stations c. internal database servers d. front-end servers
answer
d. front-end servers
question
One major obstacle to using virtual reality (VR) technology is that not enough _____ are currently available to carry out the data transmissions needed for a VR environment capable of re-creating a conference. a. nanomaterials b. avatars c. fiber optic cables d. quick response codes
answer
c. fiber optic cables
question
One advantage of grid computing is _____, meaning more nodes can be added for additional computing power without affecting the network's operation. a. improved reliability b. immersion c. scalability d. simulation
answer
c. scalability
question
A _____ is a peripheral device for recording, storing, and retrieving information. a. disk drive b. multiprocessor c. motherboard d. control unit
answer
a. disk drive
question
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization. a. integrity b. availability c. confidentiality d. validity
answer
a. integrity
question
In comparison to a flat file system, in a database, _____. a. complex requests can be difficult to handle b. more sophisticated security measures can be seen c. more storage space is required d. programs and data are interdependent
answer
b. more sophisticated security measures can be seen
question
The _____ approach to setting up a distributed database management system (DDBMS) combines fragmentation and replication. a. optimization b. allocation c. encapsulation d. normalization
answer
b. allocation
question
A(n) _____ encryption usually works better for public networks, such as the Internet. a. asynchronous b. symmetric c. asymmetric d. synchronous
answer
c. asymmetric
question
Data sent through a virtual private network (VPN) can be encrypted using the _____ protocol. a. User Datagram b. Layer Two Tunneling c. Secured Sockets layer d. Transmission Control
answer
b. Layer Two Tunneling
question
A(n) _____ operation pares down a table by eliminating columns according to certain criteria a. project b. insert c. find d. join
answer
a. project
question
Which of the following is an advantage of application service providers (ASPs)? a. ASPs ensure that applications fully meet an organization's needs. b. ASPs make certain that software is kept up to date, based on users' requests. c. ASPs offer software customized to users' needs. d. ASPs allow integration with a customer's other applications and systems easily.
answer
b. ASPs make certain that software is kept up to date, based on users' requests
question
Business analytics uses _____ to support decision-making activities. a. OLAP b. data mining tools c. dashboards d. query reports
answer
b. data mining tools
question
The four Ms of resources are _____. a. materials, money, modeling, and monitoring b. manpower, machinery, materials, and money c. management, motivation, manpower, and monitoring d. manpower, monitoring, movement, and modeling
answer
b. manpower, machinery, materials, and money
question
Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees' workstations. a. SaaS b. push c. pull d. virtual reality
answer
b. push
question
In _____ encryption, the same key is used to encrypt and decrypt a message. a. asymmetric b. synchronous c. symmetric d. asynchronous
answer
c. symmetric
question
Future progress in _____ includes further development in natural language processing that should make information systems easier to use. a. artificial intelligence b. computer literacy c. computer criminals d. personal computing power
answer
a. artificial intelligence
question
Bluetooth can be used to create a _____, to communicate among computerized devices. a. personal area network (PAN) b. metropolitan area network (MAN) c. wide area network (WAN) d. local area network (LAN)
answer
a. personal area network (PAN)
question
The output of an information system is _____. a. information b. a process c. data d. a database
answer
a. information
question
Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. a. cybersquatting b. sniffing c. pharming d. spoofing
answer
c. pharming
question
With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them. a. CAVE b. radio frequency identification c. pull d. push
answer
d. push
question
_____ are an example of internal source of data for an information system. a. Competitors b. Population statistics c. Personnel records d. Economic conditions
answer
c. Personnel records
question
The _____ operator is used when all the conditions in a query by example (QBE) form are required to be met. a. AND b. OR c. MIS d. NOT
answer
a. AND