Term
1. A DBMS makes the
a) physical database available for different logical views.
b) logical database available for different analytical views.
c) physical database available for different analytical views.
d) logical database available for different physical views. |
|
Definition
a) physical database available for different logical views. |
|
|
Term
2. The logical view
A) shows how data are organized and structured on the storage media. B) presents an entry screen to the user. C) allows the creation of supplementary reports. D) presents data as they would be perceived by end users.
|
|
Definition
D) presents data as they would be perceived by end users. |
|
|
Term
3. In a table for customers, theinformation about a single customer would reside in a single
A) field. B) row. C) column. D) table. |
|
Definition
|
|
Term
4. In a relational database, a record is referred to in technical terms as a(n)
A) tuple. B) row. C) entity. D) field.
|
|
Definition
|
|
Term
5. A field identified in a table as holding the unique identifier of the table's records is called the
A) primary key. B) key field. C) primary field. D) unique ID.
|
|
Definition
|
|
Term
6. Which of the following is not an advantage of using VOIP?
a) VOIP can reduce a firm's communication costs by 20 to 30 percent. b) It allows e-mail and voice mail to be combined into a single directory. c) It enables the creation of two distinct networks for voice and data. d) It allows new phones to be added to a network without rewiring or reconfiguring the network.
|
|
Definition
c) It enables the creation of two distinct networks for voice and data. |
|
|
Term
7. Which organization helps define the overall structure of the Internet?
a) none (no one "owns" the Internet) b) W3C c) ICANN d) IAB
|
|
Definition
|
|
Term
8. Which of the following Internet connection types offers the greatest bandwidth?
a) T3 b) DSL c) cable d) T1
|
|
Definition
|
|
Term
9. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
a. wireless network in infrastructure mode b. domain-based LAN c. peer-to-peer network d. campus area network
|
|
Definition
|
|
Term
10. To use the analog telephone system for sending digital data, you must also use
A) a modem. B) a router. C) DSL. D) twisted wire.
|
|
Definition
|
|
Term
11. Redirecting a Web link to a different address is a form of
a) snooping. b) spoofing. c) sniffing. d) war driving.
|
|
Definition
|
|
Term
12. Hackers create a botnet by
a) infecting Web search bots with malware. b) by using Web search bots to infect other computers. c) by causing other people's computers to become "zombie" PCs following a master computer. d) by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door.
|
|
Definition
c) by causing other people's computers to become "zombie" PCs following a master computer. |
|
|
Term
13. Phishing is a form of
a) spoofing. b) logging. c) sniffing. d) driving.
|
|
Definition
|
|
Term
14. An example of phishing is
a) setting up a bogus Wi-Fi hot spot. b) setting up a fake medical Web site that asks users for confidential information. c) pretending to be a utility company's employee in order to garner information from that company about their security system. d) sending bulk e-mail that asks for financial aid under a false pretext.
|
|
Definition
b) setting up a fake medical Web site that asks users for confidential information. |
|
|
Term
15. You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
a) wireless network b) employees c) authentication procedures d) lack of data encryption
|
|
Definition
|
|
Term
16. Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?
a) client computer b) communications lines c) corporate server d) internal corporate back-end system
|
|
Definition
|
|
Term
17. The HIPAA Act of 1997
a) requires financial institutions to ensure the security of customer data. b) specifies best practices in information systems security and control. c) imposes responsibility on companies and management to safeguard the accuracy of financial information. d) outlines medical security and privacy rules.
|
|
Definition
d) outlines medical security and privacy rules. |
|
|
Term
18. The Sarbanes-Oxley Act
a) requires financial institutions to ensure the security of customer data. b) specifies best practices in information systems security and control. c) imposes responsibility on companies and management to safeguard the accuracy of financial information. d) outlines medical security and privacy rules.
|
|
Definition
c) imposes responsibility on companies and management to safeguard the accuracy of financial information. |
|
|
Term
19. The Gramm-Leach-Bliley Act
a) requires financial institutions to ensure the security of customer data. b) specifies best practices in information systems security and control. c) imposes responsibility on companies and management to safeguard the accuracy of financial information. d) outlines medical security and privacy rules.
|
|
Definition
a) requires financial institutions to ensure the security of customer data. |
|
|
Term
20. The most common type of electronic evidence is
a) voice mail. b) spreadsheets. c) instant messages. d) e-mail.
|
|
Definition
|
|
Term
21. How do software vendors correct flaws in their software after it has been distributed?
a) issue bug fixes b) issue patches c) re-release software d) issue updated versions
|
|
Definition
|
|
Term
22. A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a
A) distribution channel. B) supply chain. C) value chain. D) marketing channel.
|
|
Definition
|
|
Term
23. A company’s suppliers and the processes for managing relationships with them is the
A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.
|
|
Definition
C) upstream portion of the supply chain. |
|
|
Term
24. A company’s organizations and processes for distributing and delivering products to the final customers is the
A) supplier's internal supply chain. B) external supply chain. C) upstream portion of the supply chain. D) downstream portion of the supply chain.
|
|
Definition
D) downstream portion of the supply chain. |
|
|
Term
25. Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business.
a. True b. False
|
|
Definition
|
|