Advertisement Upgrade to remove ads

circuit switching makes much more efficient use of the communications capacity of a network than does pack switching


the telephone system is an example of a ______ network


unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network

client computer

a data mart usually can be constructed more rapidly and at lower cost than a data warehouse because

a data mart typically focuses on a single subject area or line of business

which signal types are represented by a continuous form?


every record in a file should contain at lease one key field


RFID has been exceptionally popular from the technology's inception because of its low implementation costs


a DBMS separates the logical and physical views of data


the domain name system (DNS) converts IP addresses to domain names


wi-fi enables users to freely roam from one hotspot to another even if the next hotspot is using different wi-fi network services


the internet is based on which three key technologies

client/server computing, packet switching, and the development of communications standards for linking networks and computers

each characteristic or quality describing a particular entity is called an attribute


a grouping of characters into a word, a group of words, or a complete number is called a record


the device that acts as a connection point between computer and can filter forward data to a specified destination is called a


________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.


the range of wi-fi networks can be extended up to two miles by using external antennae


computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up


in addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks


which of the following is NOT true about enterprise systems

enterprise software is expressly built to allow companies to mimic their unique buesiness practices

a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes

ERP systems

an acceptable use policy defines the acceptable level of access to information assets for different users


you have been asked to implement enterprise software for a manufacturer of kitchen appliances. what is the first step you should take?

select the function of the system you wish to use

enterprise software is built around thousands of predefined business processes that reflect

best practices

which of the following is not an example of next-generation enterprise applications

solutions incorporating SCM

packet filtering catches most types of network attacks


The most common type of electronic evidence is


unauthorized access is a security challenge that is most likely to occur in which of the following points of corporate network

client computer

what is the single greatest cause of security breach

users lack of knowledge

malware includes all of the following except


a DBMS makes the

physical database available for different logical vuews

in a table for customers the information about a single customer resides in a


In a relational database, a record is referred to in technical terms as a


a field identified in a table as holding the unique identifier of the table's records is called a

primary key

which of the following is not an advantage of using VOIP

it enables he creation of two distinct networks for voice and data

which organization helps define the structure of the Internet?

NONE...maybe IP?

to use the analog telephone system for sending digital data, you must also use a


hackers create a botnet by infecting peoples computer with

zombies to follow a master compuer

phishing is a form of


an example of phishing is

setting up a fake medical web site that asks users for confidential information

you have been hired as a security consultant for a law firm. which constitutes the greatest source of a security threat to the firm?


unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?

client computer

HIPPA outlines

medical security and privacy rules

Sarbanes-Oxley act

imposes responsibility on companies and management to safeguard the accuracy of financial information

Gramm-Leach Biley act

requires financial institutions to ensure the security of customer data

the most common type of electronic evidence is


how do software vendors correct flaws in their software after it has been distributed

issue patches

a network of organization and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain

a company's suppliers and the processes for managing relationship with them is the

upstream portion of the supply chain

a company's organizations and processes for distributing and delivering products to the final customers is the

downstream portion of the supply chain

companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business


Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording