Advertisement Upgrade to remove ads

circuit switching makes much more efficient use of the communications capacity of a network than does pack switching

false

the telephone system is an example of a ______ network

circuit-switched

unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network

client computer

a data mart usually can be constructed more rapidly and at lower cost than a data warehouse because

a data mart typically focuses on a single subject area or line of business

which signal types are represented by a continuous form?

analog

every record in a file should contain at lease one key field

true

RFID has been exceptionally popular from the technology's inception because of its low implementation costs

false

a DBMS separates the logical and physical views of data

true

the domain name system (DNS) converts IP addresses to domain names

true

wi-fi enables users to freely roam from one hotspot to another even if the next hotspot is using different wi-fi network services

false

the internet is based on which three key technologies

client/server computing, packet switching, and the development of communications standards for linking networks and computers

each characteristic or quality describing a particular entity is called an attribute

true

a grouping of characters into a word, a group of words, or a complete number is called a record

false

the device that acts as a connection point between computer and can filter forward data to a specified destination is called a

switch

________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

Controls

the range of wi-fi networks can be extended up to two miles by using external antennae

false

computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up

true

in addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks

true

which of the following is NOT true about enterprise systems

enterprise software is expressly built to allow companies to mimic their unique buesiness practices

a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes

ERP systems

an acceptable use policy defines the acceptable level of access to information assets for different users

false

you have been asked to implement enterprise software for a manufacturer of kitchen appliances. what is the first step you should take?

select the function of the system you wish to use

enterprise software is built around thousands of predefined business processes that reflect

best practices

which of the following is not an example of next-generation enterprise applications

solutions incorporating SCM

packet filtering catches most types of network attacks

false

The most common type of electronic evidence is

email

unauthorized access is a security challenge that is most likely to occur in which of the following points of corporate network

client computer

what is the single greatest cause of security breach

users lack of knowledge

malware includes all of the following except

spoofing

a DBMS makes the

physical database available for different logical vuews

in a table for customers the information about a single customer resides in a

row

In a relational database, a record is referred to in technical terms as a

tuple

a field identified in a table as holding the unique identifier of the table's records is called a

primary key

which of the following is not an advantage of using VOIP

it enables he creation of two distinct networks for voice and data

which organization helps define the structure of the Internet?

NONE...maybe IP?

to use the analog telephone system for sending digital data, you must also use a

modem

hackers create a botnet by infecting peoples computer with

zombies to follow a master compuer

phishing is a form of

spoofing

an example of phishing is

setting up a fake medical web site that asks users for confidential information

you have been hired as a security consultant for a law firm. which constitutes the greatest source of a security threat to the firm?

employees

unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?

client computer

HIPPA outlines

medical security and privacy rules

Sarbanes-Oxley act

imposes responsibility on companies and management to safeguard the accuracy of financial information

Gramm-Leach Biley act

requires financial institutions to ensure the security of customer data

the most common type of electronic evidence is

email

how do software vendors correct flaws in their software after it has been distributed

issue patches

a network of organization and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain

a company's suppliers and the processes for managing relationship with them is the

upstream portion of the supply chain

a company's organizations and processes for distributing and delivering products to the final customers is the

downstream portion of the supply chain

companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business

true

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set