MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for. You may write on this question set. Record your answers on the ScanTron form. 1.? is intangible, creative work embodied in a physical form. A. Copyright B. Counterfeit software C. Fair use doctrine D. Intellectual property E. Pirated software 2. Privacy is the assurance that messages and information are available only to those who authorized to view them. 3. The? is a policy that a user must agree to follow in order to be provided access to a network or to the Internet. A. Acceptable use policy B. Anti-spam policy C. Ethical computer use policy D. Information privacy policy E. Internet use policy 4. E-mail traveling between your computer and the recipient s computer is generally not secure because servers store the e-mail temporarily and administrators may view the messages. 5. A (an)? is a program that records every keystroke and mouse click, and transmits the information to the person who installed the program. A. Adware B. Backdoor program C. Key logger or key trapper software D. Spyware 1
6. The CIA information security triangle identifies three critical information security issues, including?. A. Accessibility B. Availability C. Control D. Inspection E. All of the above 7. A? is a person who finds hacking code on the Internet and click-and-points his or her way into systems to cause damage or spread viruses. A. Black-hat hacker B. Cracker C. Cyberterrorist D. Hactivist E. Script kiddy or script bunny 8. Both viruses and worms can cause damage to computers; a virus relies on people to spread while a worm actively attempts to gain access to computers on its own. 9. Social engineering occurs when an attacker floods a website with so many requests for service that it slows down or crashes. 10.? is a method for authenticating users based on how individuals do something, such as how they write their signatures. A. Something the user does B. Something the user has C. Something the user is D. Something the user knows 11. An authorization consists of?. A. A person or group B. A resource C. The type of access D. All of the above E. None of the above 2
12. With public key encryption, a server or website (e.g., Amazon) sends the same public key to every user so that the users may send information to the server in a form only the server may understand. 13. A (an)? is hardware or software that protects a private network by analyzing information entering and leaving the network. A. Anti-spyware system B. Antivirus system C. Denial of access system D. Firewall 14. A backup should be stored offline, offsite, and in a secure location. 15. An enterprise architecture includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets. 16. An? includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization s goals. A. Application architecture B. Information architecture C. Infrastructure architecture D. None of the above 17. One of the desired qualities of an infrastructure architecture is?, which deals with how well a system can adapt to increased demands. A. Availability B. Flexibility C. Performance D. Reliability E. Scalability 18. Web services consist of a collection of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services. 3
19. Open source is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them. 20.? is a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. A. Failover B. Fault tolerance C. Recovery D. Reliable computing 21. A? is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster and install systems, software, and other resources to continue operations. A. Cold site B. Warm site C. Hot site D. All of the above E. None of the above 22. Service oriented architecture (SOA) is a business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services. 23.? is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. A. Accommodative computing B. Cooperative computing C. Interoperability D. Shared computing 24. Tight coupling is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional components. 4
25.? enables virtualization of user-oriented systems such as the operating systems running on personal and laptop computers. A. Application virtualization B. Desktop virtualization C. Server virtualization D. End-user computing virtualization 26. Which of the following is not a reason for organizations to adopt virtualization? A. Data centers running out of space B. Hardware underutilized C. Increased energy costs D. System administration costs mounting E. All of the above are reasons to adopt virtualization 27. Grid computing is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data. 28. Information granularity refers to the extent of detail within the information. Information may be detailed, summary, or aggregate. 29.? encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks. A. Analytical information B. Decisional information C. Operational information D. Transactional information 30. A (an)? provides immediate, up-to-date information in response to query requests. A. Batch system B. Online system C. Real-time system D. None of the above 5
31.? addresses the question, Is aggregate or summary information in agreement with detailed information. A. Accuracy B. Completeness C. Consistency D. Timeliness E. Uniqueness 32. A (an)? is a characteristic or property of a person, place, thing, transaction, or event about which information is stored. A. Field, attribute, or column B. Record, entity, or object C. Relationship D. Table or class 33. A primary key is a field (or group of fields) that uniquely identifies a given entity (record) in a table. 34. A (an)? is a constraint that determines acceptable values for a field. A. Field constraint B. Referential integrity constraint C. Validation rule D. Value constraint 35. Redundancy is the duplication of information in multiple places. 36.? is a set of Structured Query Language (SQL) commands used to define structures in a database, including tables, fields, and relationships. A. Data Definitional Language (DDL) B. Data Manipulation Language (DML) C. Data Query Language (DQL) D. None of the above 6
37.? is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision-making tasks. A. Data store B. Information store C. Data warehouse D. Information warehouse 38. Extraction, transformation, and loading (ETL) is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse. 39. Data scanning is the process of analyzing data to extract information not offered by the raw data alone. 40. A network is a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. 41. A? is a network spanning a facility. A. Campus area network (CAN) B. Local area network (LAN) C. Metropolitan area network (MAN) D. Valued-added network (VAN) E. Wide area network (WAN) 42. A? is a private network, provided by a third party, for exchanging information through a high capacity connection. This type of network supports business-to-business exchanges. A. Campus area network (CAN) B. Local area network (LAN) C. Metropolitan area network (MAN) D. Valued-added network (VAN) E. Wide area network (WAN) 7
43. A? is a way to use the public telecommunication infrastructure (e.g., Internet) to provide secure access to an organization s network. A. Business security network (BSN) B. Secured business network (SBN) C. Valued-added network (VAN) D. Virtual private network (VPN) 44. Although the cellular network is useful for individual communications, businesses generally do not use the cellular network. 45.? is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants (PDAs) can be easily interconnected using a shortrange wireless connection. A. Bluetooth B. Greenacher C. inet D. Mininet 46.? is commonly used to transmit network signals over great distances, using a specific radio frequency, along a line of site between towers. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 47.? is a means of linking computers using radio signals over short distances like within a home or office. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 8
48.? is a telecommunications technology aimed at providing wireless data over long distances using radio frequencies. This technology uses a central tower to provide communications over a large area. A. Line of site radio frequency (LSRF) B. Microwave C. Wireless fidelity (wi-fi) D. WiMax 49.? is a system designed to work with information that can be shown on a map. A. Geographic information system (GIS) B. Global Positioning System (GPS) C. Location-based services (LBS) D. Mapping information system (MIS) 50. Radio formatted information diodes (RFID) uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers. Turn in this question set and your ScanTron form. 9