How can we help?

You can also find more resources in our Help Center.

50 terms

QUIZ 3,4 + More BUS 101

STUDY
PLAY
circuit switching makes much more efficient use of the communications capacity of a network than does pack switching
false
the telephone system is an example of a ______ network
circuit-switched
unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network
client computer
a data mart usually can be constructed more rapidly and at lower cost than a data warehouse because
a data mart typically focuses on a single subject area or line of business
which signal types are represented by a continuous form?
analog
every record in a file should contain at lease one key field
true
RFID has been exceptionally popular from the technology's inception because of its low implementation costs
false
a DBMS separates the logical and physical views of data
true
the domain name system (DNS) converts IP addresses to domain names
true
wi-fi enables users to freely roam from one hotspot to another even if the next hotspot is using different wi-fi network services
false
the internet is based on which three key technologies
client/server computing, packet switching, and the development of communications standards for linking networks and computers
each characteristic or quality describing a particular entity is called an attribute
true
a grouping of characters into a word, a group of words, or a complete number is called a record
false
the device that acts as a connection point between computer and can filter forward data to a specified destination is called a
switch
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
Controls
the range of wi-fi networks can be extended up to two miles by using external antennae
false
computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up
true
in addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks
true
which of the following is NOT true about enterprise systems
enterprise software is expressly built to allow companies to mimic their unique buesiness practices
a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes
ERP systems
an acceptable use policy defines the acceptable level of access to information assets for different users
false
you have been asked to implement enterprise software for a manufacturer of kitchen appliances. what is the first step you should take?
select the function of the system you wish to use
enterprise software is built around thousands of predefined business processes that reflect
best practices
which of the following is not an example of next-generation enterprise applications
solutions incorporating SCM
packet filtering catches most types of network attacks
false
The most common type of electronic evidence is
email
unauthorized access is a security challenge that is most likely to occur in which of the following points of corporate network
client computer
what is the single greatest cause of security breach
users lack of knowledge
malware includes all of the following except
spoofing
a DBMS makes the
physical database available for different logical vuews
in a table for customers the information about a single customer resides in a
row
In a relational database, a record is referred to in technical terms as a
tuple
a field identified in a table as holding the unique identifier of the table's records is called a
primary key
which of the following is not an advantage of using VOIP
it enables he creation of two distinct networks for voice and data
which organization helps define the structure of the Internet?
NONE...maybe IP?
to use the analog telephone system for sending digital data, you must also use a
modem
hackers create a botnet by infecting peoples computer with
zombies to follow a master compuer
phishing is a form of
spoofing
an example of phishing is
setting up a fake medical web site that asks users for confidential information
you have been hired as a security consultant for a law firm. which constitutes the greatest source of a security threat to the firm?
employees
unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?
client computer
HIPPA outlines
medical security and privacy rules
Sarbanes-Oxley act
imposes responsibility on companies and management to safeguard the accuracy of financial information
Gramm-Leach Biley act
requires financial institutions to ensure the security of customer data
the most common type of electronic evidence is
email
how do software vendors correct flaws in their software after it has been distributed
issue patches
a network of organization and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a
supply chain
a company's suppliers and the processes for managing relationship with them is the
upstream portion of the supply chain
a company's organizations and processes for distributing and delivering products to the final customers is the
downstream portion of the supply chain
companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business
true