Upgrade to remove ads
WGA Information Systems - Units 3-5
Terms in this set (238)
What manages the activities of the computer?
Name two system softwares.
Utility software (helps analyze, configure, optimize and maintain a computer) and Operating systems (help manage the hardware and software resources).
Linux is an open-source software that is only found on PCs. True or False?
False - It is open source and found in cell phones, smartphones and consumer electronics, including PCs
What is a pro of having an open-source software?
It is accessible by many developers and, therefore, contains FEWER DEFECTS.
Software that is created and updated by multiple programmers and available at no cost is called what?
Name an example of proprietary software.
What type of software requires a license to purchase?
What is needed to create a computer program that gives instructions to a computer?
Name a programming language designed for managing data in a relational database management system.
SQL - Structured Query Language
What is a software language for creating web pages?
HTML (Hyper Text Markup Language)
What is a multi-purpose programming language used to create computer apps, play games and communicate with friends?
What accurate describes object-oriented programming?
Class - it is the blueprint for an object....similar to a building blueprint, a class is a template for an object.
The length of time from the beginning of the software development until the time that it is no longer needed or useful is known as what?
Software life cycle - Becomes outdated after a period of time
What is another name of a software defect?
Because a lot of free software is available, managing software licenses is not a concern for modern orgs. True or False?
False - licenses usually have expiration dates or limited downloads, and the free software is more limited in capability.
There is usually no additional cost to allow other employees to download and use proprietary software. True or False?
False - it usually has an expiration or renewal date and download limits.
What is a formal contract between a customer and the service provider detailing the level of service expected from the provider?
SLA - Service level agreement - formal contract between a customer and the service provider detailing the level of service expected from the provider.
RFID (Radio-frequency identification) enables a company to track merchandise or inventory by radio frequency signals, eliminating the need to physically handle each item during what?
What is an example of an app you will likely find at your workplace that was developed and then enhanced to allow smartphone and PC users to speak search instructions to their computer instead of using a keyboard?
Google Voice Search
Analytic apps are a type of operating system that are used to measure and improve business performance. True or False
False - Analytic apps are a type of application, not an operating system...they are used to measure and improve business performance.
The evolution of application technology includes application intelligence and analysis platforms, which allow companies to mine and monitor data in order to spot trends. What is an example of this evolution of apps?
AppDynamics - includes application intelligence and analysis platforms, which allow companies to min and monitor data in order to spot trends.
What is the analytical process in which large amounts of data are searched and analyzed in order to find trends or patterns?
What is an example of cloud computing?
Google Drive - file storage is managed offsite.
What is a pro of cloud computing?
Decreases complexity - by storing data and software so that multiple users can share, edit and collaborate on files.
The software that enables users to access the cloud is known as cloud fabric. What is the title of the cloud fabric person who monitors and provides cloud resources to users?
Software programs have a minimum speed and memory requirements True or False?
True - they have both minimum memory and speed requirements for the hardware on which they will be installed
What types of storage needs should be considered when examining software requirements?
Primary and secondary
Software as a service is an example of software that is loaded on existing hardware. True or False
False - SaaS is proprietary software that is stored in the CLOUD and can be accessed by users who have a license.
If the existing hardware is not compatible with new software requirements, an alternative would be to purchase software that is accessible through what other means?
What is the best definition to describe a database?
Set of data that are organized and easily searchable through queries.
What represents a set of data, typically aligned as a row in a table?
What term defines a database entity?
Event, person or thing for which a business collects data.
What is a powerful server that stores the databases files and database management systems?
What is NOT a database model?
Structured - Relational and object databases are database models.
What is an example of an "object" in a database?
What does OLAP stand for?
Online analytical processing and are databases used to assist decision making
What database model connects or relates different data tables using common fields called primary keys?
What kind of attribute or field would be a good choice for a primary key?
Student ID - which is a unique identifier that is made for each student
What is the difference between a spreadsheet table and a database table?
Database tables have relationships, allowing for queries that lead to information.
What are two desirable characteristics of data integrity?
Accuracy and consistency
What is a key advantage in business in having a web-based database rather than a client-server traditional database?
Can access from anywhere
What kind of database management system enables businesses to create new records and update and delete records, providing real time information for decision making?
OLTP - Online transaction processing is a database design used for browsing and manipulating business transaction activity to enable real time business analysis of records to help in business decision making.
What uses a flexible model in which data are distributed among several machines, often in a cloud-computing format?
Web-based database in contrast to machine-based relational database which are stored on one central machine and not multiple machines.
What is a common business use of an operation database?
Operation databases can be used to track real-time inventory. (OLTP)
What is one tool a business can use to map process requirements and data to develop a supporting relational database?
ERD - Entity relationship diagram - outlines the business processes and subsequent relationships and possible data requirements.
What is an example that represents a one-to-one type of relationship between entities?
Each person has an SSN
What is the name of the notation used to diagram the relationship between entities?
Crow's foot - used to indicate one, one and only one, none or many. I.E., one and only one customer can can buy none to many products. One sales rep can help none or many customers.
What is a relational database which stores data in tables can be designed using what?
Entity-relationship model - basic tool when designing a relational database.
What term is used to describe the properties of data components?
In database modeling and design, what is meant by database normalization?
It means removing redundancy in the conceptual model. Databases must go through normalization in the design process to simplify complexity where possible and remove redundancy between elements.
One goal of a db admin is to have a db that has the same entities and values in one more tables. The database should go through what process to optimize?
Normalization - this eliminates the first-pass design redundancies that could create query and reporting problems in DBs.
For referential integrity to be enforced in a relational db, a primary key does not need a corresponding entry of equal value in the reference table. True or false?
False - A row value or primary key in a table only exists if an item with an equal value (foreign key) exists in a reference table.
_______ is a process to eliminate data redundancy and _______ establishes relationships between tables using keys.
Normalization and Referential integrity
Relational database systems are valuable to orgs because __________.
They use SQL which is easy to master, making it a very productive tool. Users become productive in a very short period of time.
Relational database systems give orgs the ability to analyze data to make better and faster managerial decisions. True or False?
True - one key benefit to databases is that they provide businesses an ability to perform data analytics.
What are the two key factors when determining to implement a relational database?
Data and users
What trait is NOT one of the benefits leading to the widespread use of relational database?
Tree-like structure - this is a hierarchical database characteristic
What is the best definition of big data?
Used to describe large, complex data sets.
What is NOT a characteristic of big data?
Object data - Object data cannot be processed through analytics.
What is NOT a data management challenge created by big data?
Cost - Big data technologies and cloud-based analytics can provide substantial cost advantages.
Big data can be structured, semi-structured or ____________.
Unstructured - Big data algorithms can handle any type of data set.
What does velocity mean when discussing big data characteristics?
Velocity is the speed required to process or analyze big data.
What best defines data warehouse?
A collection of business data from multiple systems used for data analysis and mining.
Why would a business implement a data warehouse?
A data warehouse improves decision making - store and access data from multiple sources to be queried and analyzed.
What is NOT a data warehouse application?
What are made up of repositories of data from several sources and are mostly used to help management decision making?
Reporting and analysis.
What is the process to update or backup a data warehouse?
Extract, transform and load
Which term describes the procedure in ETL (extract, transform and load) that correlates the data with the data warehouse format?
Why does the ETL process run in parallel and not in sequential order?
Because the extraction step is lengthy.
What is a required process in implementing and maintaining a data warehouse?
Partitioning - A typical relational data warehouse is made up of indexed tables that can be implemented using a partitioned approach. Relational data warehouses benefit from partitioning the data as part of implementation and maintenance.
It is critical to build a data integrity check algorithm to ensure the quality of data in a database before what phase in the ETL process?
What is considered an efficient database backup strategy?
Reducing volume of data for regular backups.
Horizontal and vertical partitioning are the most two common recesses in partitioning databases. What is horizontal partitioning?
It restricts the rows to replicate in the backup process.
Data mining is used by businesses to analyze internal factors in order to improve business performance
True - analysis of internal business data.
When considering data mining and its benefits to business, what is required for an enterprise today to be competitive and gain business intelligence from day-to-day ops?
A large business or enterprise must implement a data warehouse app and perform data mining or analytics to gain BI.
Data mining is sometimes referred to as________________
Data mining methodology is ___________
More complex data mining methodology is _____________
A third type is ______________
Artificial neural networks
Predictive analytics of multidimensional data can lead to better decisions and lower costs. What is a multidimensional database?
Relational database that is structured as a cube - contains aggregated data related to all dimensions and allow businesses to visualize data assets in multi-dimensions to what is happening in real time.
Predictive analytics is used by businesses to predict trends or behaviors from customers. True or False?
What is an effective use of predictive analysis?
An insurance company is analyzing medical records to determine malpractice rates.
Data mining, predictive analytics and online analytic processing are all part of a category called ___________
BI is a strategic element and helps companies gain a ____________
What is a major function of a database management system?
Data administration - includes maintaining data integrity, recovering corrupted info and managing users and group access to the data.
The earliest commercially available electronic, digital computer that occupied a 20' x 40' room and consisted of 18,000 vacuum tubes? True or False?
What was considered the first electronic, digital computer and called "Great Brain?
ENIAC - First digital computer developed in the 1940s by the military.
What was the first general purpose computer for commercial use?
UNIVAC - Developed in the 1950s as the first general purpose computer
What company's computer made the term PC popular?
What is the chronological evolution of computing in business?
Mainframe, minicomputers, microcomputers
Integrated circuits consist of sets of electronic circuits on a chip or plate of semiconductor material and replaced transistors. True or False?
True - Vacuum tubes were replaced by transistors that were replaced by integrated circuits.
Best definition of software:
Set of machine readable instructions that directs a computer. Programmers create software programs to make computers do things. The OS and applications are software.
What would I need if my dev team needs a software app to provide tools like compilers and debuggers? What type of programming?
IDE - Integrated Dev Environment is a "place" that provides tools to developers to write code.
Low-level programming software consists of machine language instructions while high-level programming software is closer to natural language is easier for humans?
True or False?
True - All software is compiled to a machine language is low-level, while humans need high-level programming software for ease in coding.
What was the first computer language developed in the 1950s for business computing?
COBOL, and it stands for Common Business Oriented language.
What programming languages would I use if I were hiring software developers for my team and identifying current programming languages?
C++ and Java - These are the programming languages in use today.
Benefits of using "Microcomputers"
Lower IT costs
User flexibility and computer power
Hardware and software apps help _____ and _____ in business practices?
Productivity (by automating and speeding up processes)
What are some benefits that software apps have had on business effectiveness?
Innovation - through data analysis, reporting and decision making
Reduced clerical roles - with repetitive tasks
What are two ways that hardware devices are used in business?
Computer processing power is driving big data analysis
Mobile devices are helping to drive business productivity
Computer hardware refers to all the inner components of a computer.
True or False?
False - Hardware is not just the inner components of a computer. Includes externals like monitor, mouse, keyboard, etc.
What are the four basic operations in the computer's information processing cycle?
Input, output, process and storage
Name four peripheral devices.
Mouse, keyboard, monitor and printer
What described input and output in computers?
Input are instructions and output is the result.
Computers need input, whether that be from a keyboard or other means, and the function is to perform a task resulting in an output like print or display.
Input devices for a computer system:
Input and Output devices:
Modems and monitors
What is the brain of the computer that executes commands and processes mathematical and logical operations?
Which component of the PC connects all of the components to each other for data transfer between devices for PC operation?
Internal Bus - Connection and data transfer between motherboard and CPU
What does a microprocessor do?
Responsible for a computer's instruction style - Holds millions of integrated circuits in a semiconductor chip.
What is a multi-core processor?
Chip with multiple, independent CPUs - Provides more computing power, can run multiple instructions in parallel.
What does (Gordon) Moore's Law state?
The number of transistors in an integrated circuit doubles every two years - processor speeds and power doubles every two years. This has continued to prove true since 1965!
What two classes is storage composed?
Primary and secondary - Primary is the internal memory, which includes RAM, including cache which is temporary. Secondary is external memory such as hard drive and other permanent devices.
What does RAM do?
Gets instructions from ROM to launch the OS during bootup. - it is the primary storage device that holds data, apps, instructions and the OS while the computer is on.
For an IT budget, what type of computers would I add in a business setting?
Wireless devices - they use the client-server environment
What is the difference between a dumb terminal and a client?
Dumb terminal is for input and output, while a client can also process instructions - A client has a CPU allowing it to process instructions while a dumb terminal is limited in power and therefore cannot process instructions.
Powerful computers capable of running engineering applications:
What is the difference between a dual core and quad core chip?
Quad core offers more power, allowing more multi-tasking capabilities.
What is meant by a 2-in-1 computer system?
A laptop that can be used as a tablet.
What is virtualization in computer system infrastructure?
Assigning part of a computer systems, to rim different operating system
What is application software?
Includes programs such as database, word processing, presentation, web browsers and spreadsheets
What is an application suite?
Bundle of application programs with related features and functions - I.E. Microsoft Office Suite
What applications are more popular and general purpose, such as word processing software?
What type of software is designed for a specific function, department or industry?
Vertical Software - Such as accounting software
Primarily used on servers but does not support the range of applications that most users need on a desktop:
Used on Apple computers and runs on a UNIX engine but with an easy-to-use graphical interface:
This operating system is the market leader for workstations and servers. Has its own internal software and graphical user interface:
Free OS and re-creation of UNIX but more popular than UNIX for workstations. Millions of programmers participate in its development.
Database management systems help businesses manage and organize their information more efficiently. What tools organize a company's data into two-dimensional tables?
Relational DBMS - collection of files (tables) that are organized by columns (fields) and rows (records).
What capabilities does a DBMS enable in a database?
Input, modification and retrieval of data - DBMS is the enabler for all activities in a database.
DBMSs can be used in businesses and at home to store and manipulate important data ranging from complex customer info to kitchen recipes. Microsoft Access is an example of what kind of DBMS?
DBMS for personal computer systems
What is the purpose of a DBMS's dictionary function?
Defining and managing the data types.
When a bank keeps client financial information in several different files, the bank staff has to update customer info in several locations. What is this an example of?
Data redundancy - same info is stored in more than one location. A DBMS can solve the problems of data redundancy.
The DBMS for your bank contains many tables and two of them are Loan and Customer. If a bank teller accidentally deletes your mortgage loan from the DBMS, your file has missing info and is in violation of what?
Data integrity - refers to the accuracy and consistency of the data stored in the database.
A DBMS for your bank contains many tables. If the address in your bank account is different from the address on your montly banking statement because customer info is stored in several places, what is this an example of?
Data inconsistency - this happens when the same attribute has different values when the data is stored in more than one location.
Recommendations and solutions for optimizing or maintaining banking data over the long term would be a result of what?
Data quality audit - process to determine the reliability, completeness and accuracy of the data in a database.
A retail company such as Amazon.com uses DBMS to discover customers' past spending trends and to predict future shopping behaviors. True or False?
False - Amazon collects a lot of data every day. The amount is so huge that they cannot be managed or mined by a DBMS.
Which tool do store managers at Best Buy use to price their products appropriately and attract customers to make more purchases?
Business Intelligence - BI refers to the infrastructure, data set and relevant software tools that managers used on their company's databases to help them make better and more informed decisions.
There are many BI tools that help businesses acquire and analyze semi-structured and unstructured data. I.E., a major TV network can use ___________ to analyze the social media data collected from the network's FB account or ____________ to view a single set of viewer's data in many ways from various dimensions such as age and gender.
Hadoop and OLAP - Hadoop is a Java-based open programming framework that supports big data collection, processing and analytics of a distributed computing environment. OLAP is a technique used to analyze business data and process online ad-hoc queries.
A major financial institution such as CitGroup can use _________________ to analyze huge amounts of data to determine the ways consumers make big purchasing decisions, or it can use both relational and non-relational tools on a high- speed __________________ to perform big data analysis.
In-memory-computing and analytical platform
Data integrity in a customer database can be maintained by allowing users to add but not delete data or fields from the database and assigning security permissions. T or F?
CitiGroup can prevent its employees from making unauthorized changes to customers' information by doing what?
Maintaining explicit access controls
A health insurance company can prevent its users from entering the wrong type of information on its website by doing what?
Enforcing format rules
eBay can prevent a customer from accidentally deleting a product from its website by doing what?
Limiting the risks to data destruction
An org's information policies are formally and officially developed by the IT department. T or F?
False - Information policies are
In an org, who or what dictates how ee's can acquire, access and manipulate the org's information?
Information policy administration
Who or what deals with the physical aspects of the company data resources?
Database Administration - responsible for creating and managing the whole DBMS
Who or what reveals inconsistencies in the employee's access to the company's data?
Who or what deals with the internal aspects of the company data resources?
Data administration - In charge of developing and maintaining policies and procedures to manage internal data resources.
The main purpose of data governance is to maximize data quality through effective utilization, availability, and protection of data and information. T or F?
When designing websites for online retailers, it's important to enforce format rules and data collection procedures to ensure data integrity and improve data consistency when shoppers input their personal info and orders on the Internet. T or F?
Data consistency can be significantly affected depending on how data is input and ________ in the database.
Data that is not __________ properly, internally or externally can result in serious security threats to the company.
Measures must be imposed to determine that data is ___________ and manipulated by the person in the org.
Policies must be enforced to determine how long data must be ________ in an org.
Procedures must be in place to make sure data is properly _________ for security reasons.
Data scrubbing is the process of detecting bad records from a database, but it does not remove them. T or F?
False - Data scrubbing checks for data consistency; it will check and fix corrupted records and remove bad records from the database.
Auditors will conduct a data quality audit only if there are concerns that the data violates any of the data integrity rules. T or F?
False - Monitoring and maintaining the data integrity of a database is a formal and on-going process.
Ogs must perform an annual _______________ to ensure database accuracy. Data must go through a process of ________________ before they are subjected to the process of ________________ and they are stored in a ___________________.
Data quality audit
Sentiment analysis is a software tool that businesses can use on the Internet to examine and obtain opinionated info collected from social media websites. T or F?
True - Sentiment analysis is used to analyze textual databases, or that which contain text resources, such as social media messages and email.
Online retailers such as Amazon and eBay use clickstream analysis to identify customers' browsing and shopping habits so they are able to market other similar product to their customers. T or F?
True - clickstream refers to the recording of clicks that a user made while browsing on the Internet. Clickstream analysis will identify user's activities on the Internet.
Why type of platform/service uses a number of non-relational databases to conduct analyses from multiple geographic locations.
Amazon Web Services
What cloud-based version of a relational database management system deals with both structured and unstructured data?
Microsoft SQL Azure - cloud-based version of SQL server that provides high availability.
Specific databases are used for organizing and indexing social media messages and emails. Which item contains information collected from the internet?
Textual databases - contain resources such as social media messages and email and are mined for sentiment analysis.
What item refers to the extraction and collection of information from the Internet for further analysis?
Web mining - creates databases which are mined to understand customer behavior and improve customer intimacy.
Unlike SCM and CRM installed on business servers, health analytics tools are applications installed on smartphones, so they cannot identify event sequencing, classify patterns, cluster similar records, or predict future outcomes. T or F?
True - Health analytics tools are usually apps created for smartphones or portable devices to keep track of the device owner's health and exercising stats, and they have limited capabilities.
Insurance companies have a variety of tools for analyzing data. Which tool is used to analyze big data to find a niche target for their insurance products?
CRM - CRM analyzes the company's big data to identify associations, correlations and relationships among customer variables.
Apple Watch is an example of a ________ tool, which uses a sensor to collect health or exercising data of the person wearing it.
Salesforce is an example of a ______________ tool, which provides customer service support.
Customer Relationship Management
Companies such as Nike use _______________ tools to manage their warehouse and distribution activities.
Supply Chain Management
In contrast to big data analysis, data analytics can only be used to directly influence small changes in our lives, such as turning on the coffee maker and the oven at home. T or F?
The energy management system (EMS) transforms energy data into info so businesses can understand energy consumption and patterns. What is NOT true about the EMS?
It manages energy usage - EMS identifies ways that users can optimally manage the usage of energy.
There are many uses for geographic information systems (GIS) in business to help solve problems. I.E. a GIS can help county admins decide when and where to build a new high school.
True - It can help them to understand the population density changes and demographic trends and decide when a new high school is needed to accommodate the growing youth population.
Telecommunications technology has always been essential to business. What is the best definition of telecommunications?
Exchanging information via electrical signals - achieved by exchanging information between various entities over electrical, electromagnetic or digital networks over short and long distances.
WAN networks are interconnected via the Internet, private networks or ______________________. (WAN means wide area network; the internet is a WAN.)
public switched telephone network - WANs are interconnected through the Internet using IP protocol or through private networks and even through the POTS, the plain old telephone system.
Telecommunication networks transmit data voice and ________________ over long distances.
What best describes a computer network?
Data communications system that uses cable or wireless media to transmit and receive signals - or a collection of interlinked computers that can exchange information over links in the form of digital packets.
How are WAN networks connected?
Via the Internet, private networks and the public switched telephone network - also collections of remote business campuses that use the Internet, private and public switched networks.
Why do communications networks use defined rules or standards called protocols?
To ensure communication between devices is accurate and understood. They are also used to ensure the transmission of digital data communicated in packets between devices is accurate and understood by the receiving device.
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol. (Communication rule of the internet)
If you are building out wired technologies in an old building and replacing token rings, what technology are you most likely replacing it with?
Ethernet - replaced token rings as a data communications standard in LAN applications.
A network protocol designed to handle broadband integrated services such as voice and video is ____________.
ATM - Asynchronous Transfer Mode and was designed to provide quality of data of voice and video via to provide quality of data of voice and video via circuit switching.
A ______________ is a set of rules applies to data switched networks to ensure quality and accuracy of signal transmission and reception.
What is a network host? (Also known as data terminal equipment in computer networking hardware.)
Physical node with an IP address
What is NOT a computer network hardware device?
Sniffer - (or packet analyzer) is used to monitor or log traffic on a network for troubleshooting or analysis but is not a network hardware device.
If you were building out a telecommunications network and wanted to take signals and data packets from multiple devices and combine them into a single signal, you would use a multiplexer.
True - Data signals traveling over computer networks are combined together by the use of a multiplexer.
Small office or home office routers enable computers to access the ______________. Connection to the web is enabled by service providers called _______________.
A network host is a _______________ in a data communications network and is assigned an IP address.
Node - a network host or data terminal equipment is a node in a network.
Why do home office or small business computer networks sometimes use a peer-to-peer topology?
Peer-to-peer allows file sharing between computers - small business or home networks often do not have a server computer, therefore peer-to-peer is more desirable.
Large business enterprises require core routers in their telecommunications computer network to support multiple telecommunications interfaces of the highest speed. What else does a core router do?
Core router operates in the Internet backbone - it is very powerful and is used to aggregate data and connect the enterprise to the Internet in the backbone in order to handle large amounts of traffic.
Businesses, regardless of size, need hubs, switches and routers to access the world wide web. T or F?
False - They might require significant network equipment in order to optimize network performance, but small businesses can manage with only a router.
Small businesses with computer server needs should design their networks as client-server. T or F?
Large enterprises can manage moves and changes more productively with virtual network capability. T or F?
Large orgs leverage _______________ network management applications to better handle changes and moves.
Virtual - used to manage moves and changes more productively.
What information is enclosed in transmission packets?
Data packets include destination address, relay information and error detection - among other things, data packets have the destination IP address, the actual information to be sent, which can be parceled into many other packets and error detection in case transmission fails.
Data packet switching is more efficient than circuit switching because it leverages the entire computer network capacity. T or F?
True - can be broken up and sent through the entire network to be reassembled at the destination.
The TCP protocol consists of ______________ layers. _______________ is not a protocol layer but an OSI layer.
Four (abstraction layers)
What is the difference between an analog signal and a digital signal?
Analog signals are continuous electrical waveforms while digital signals are not, they are discrete, binary noncontinuous electrical waveforms.
How is voice or video information carried on digital networks?
Voice and video data are transmitted using circuit switching methods - They are packetized but transmitted on circuit switching networks instead of packet switching networks.
Computer networks enable circuit switching. What does this mean?
They create a point-to-point packet digital circuit in circuit switching. This allows point-to-point communication.
The ability for a telecommunication network to carry voice, data and video is called _________________.
A ______________ network is able to carry data, voice and multimedia information.
What best describes the implications of the Internet of Things?
leads to automated servicing of smart devices - IoT will make all devices and systems "smart" so they will be able to communicate via the Internet to automate servicing needs.
Over the next five years, what type of devices will surpass Internet access from personal computers?
Social media, mobile devices and ________________ are three growing trends in the business sector that have wide implications and offer opportunities and risks.
Which best defines social media in today's information age?
Social media are Internet-based apps where users interact with one another.
Ogs can use the Internet as a communication toold I.E., orgs can communicate ________________ in real time, with other clients using online chat or instant messaging apps. On the other hand, orgs can communicate _________________ with their clients via bulletin boards, blogs and streaming videos.
Synchronously - happening at the same time. Online chat and IM allow users to communicate at the same time.
Asynchronously - refers to events happening at different times.
A Walmart customer visits the Walmart.com site as a client, puts in a request to the Walmart server system and the system processes and fulfills the client's request. This is known as what type of system?
Client-Server - computer transactions where the server fills a request made by a client are common in business and the client server model has become a central part of network computing.
Users can communicate on the Internet via _________________, such as instant messaging, audio and video communications, or unified communications; or they can use ___________________ as repositories of information; or they can use _________________ to access remote computers.
Electronic communications - consist of emails, instant messaging, audio clips, video comms and unified comms
File storage and hosting - refers to repositories of info, storage for retrieval or archival of documents
Portals and connections - consist of apps, protocols and other technology that allow protected and unprotected connections from one computer to another.
A communication protocol is defined as a set of rules that does what?
Allows communication systems to interact.
The 802.3 standard, created in 1083 by the institute of Electrical and Electronics Engineers (IEEE) is also known as the Internet standard. T or F?
False - The TCP/IP, which defines how data are relayed between networks, is the Internet standard. 802.3 is an Ethernet standard and defines LAN connections.
Companies and individuals who are not able to connect directly to the Internet through a local area network (LAN) server could access the Internet by subscribing or connecting to what?
ISP - Internet Service Provider - (Charter)
What is the purpose of the Domain Name System?
Converts domain names into IP addresses. DNS converts unique IP addresses to domain names, such as Google.com to its IP address 188.8.131.52
A client-server network linking several individual computers or a LAN network together, each of the client computers connected to the network server is provided with _________________ so that it can be found by others on the network?
What is the governing agency that determines what is and is not acceptable on the internet?
FCC (Federal Communications Commission)
VoIP is based on a high-speed Internet connection deliver voice communications. T or F?
VoIP results in lower phone charges for business because long-distance calls are toll-free.
Companies can use the _______________ to manage their internal phone system, or employees can use the ____________ to gain remote access to the network server. If budget is a concern, managers could request that employees use _______________ for meetings. Employees can also use the _______________ function on their company-issued smartphones when travelling to client's site.
If a manufacturing plan uses their systems to communicate with suppliers and vendors to manage their inventories, what app is used?
Extranet - used to communicate with suppliers and vendors to manage their inventories
The Internet has become a valuable tool for businesses. What is not a benefit of the Internet for a business?
Conduct personal matters
Using a web server to connect to the corporate databases on the cloud, an intranet can provide many benefits. What is NOT a benefit of an intranet?
Customer communications - Intranet is for internal use only.
The increasing complexity of the new computer systems resulted in the development of two frameworks, Information Technology Infrastructure Library (ITIL) and the Control Objectives for Information and Related Technology (COBIT). T or F?
True - ITIL and COBIT were created to allow businesses to better plan their infrastructure, manage IT services, control changes and reduce complexity as the scale of their information systems grew.
ISO stands for International Organization for Standardization. ISO 20 is not an ISO standard. The standard frameworks are ITIL and COBIT and the standard is the ISO 20000.
Bluetooth is a wireless technology that allows the exchange of data. Why is this technology a benefit to business?
It is relatively easy to configure - allows for easier communication.
Wireless communication is transmitted over _____________ through the _______________.
The second generation, or 2G, launch used which digital standard for data and voice communication?
CDMA - code division multiple access was developed during the second generation cellular networks.
Wireless threats come in all shapes and sizes and can be destructive to a business. What is meant by sniffing a wireless network?
the act of eavesdropping and capturing traffic data packets and decoding them into readable format.
Why is it easier to sniff a wireless network than a wired, landline network?
because traffic can be easily intercepted
Wireless business networks enable workers to access information from anywhere, but they also create vulnerabilities to business information systems. T or F?
True - they allow access to company information from anywhere, but they are more easily hacked
As an e-comerce company, your business is susceptible so efforts are made to prevent a denial-of-service attack. A denial-of-service attack is a means to _____________ or suspend services of an Internet host. Denial-of-service attacks are common threats to _____________ websites.
4G networks provide IP-based voice, data and multimedia traffic at what speed?
4G networks can carry traffic as fast as 1 Gbit per second.
Wireless network security is improving because of the new security protocol called WEP. T or F?
False - WEP or Wired Equivalent Privacy was replaced by Wi-Fi Protected Access (WPA)
Wireless LAN can offer businesses greater productivity and cost savings. What else is true about wireless LAN networks?
Wireless LAN networks be easily changed and configured.
To determine the best location for access points, what assessment should be conducted?
RF site survey - To ensure optimal network performance, an RF site survey should be performed to locate the best location for wireless network access points.
Wireless network installation is straight forward and can typically be done in-house, by the company IT professionals, without outside assistance. What is the key planning activity when setting up a wireless network?
Determining access points and locations
Wireless LAN networks are simple to install because there is no ___________ installation through walls or ceilings. Wireless LAN networks support the mobility of the on-site workforce, which increases ______________ and access to real-time information.
It is fiscally too expensive to upgrade wireless Wi-Fi access points built before 2003 (which have WEP encryption protocol) to the more secure WPA standard. T or F?
True - The changes in firmware required to upgrade to WPA are too expensive. Access points with WEP are therefore more vulnerable to hacks.
WPA2 has replaced WPA as an encryption protocol. T or F?
Wired networks provide enterprise network reliability and ____________. At the same time, the downside of wired networks is the large amount of _____________ in the building which are awkward to map, manage and maintain.
A company that wants to monitor warehouse temps across various locations can deploy ______________.
WSNs have sensors that need to be wired into a network in order to transmit and receive signals. T or F?
WSNs - have sensors that need to be wired into a network in order to transmit and receive signals
False - Sensors in WSNs are able to transmit and receive signals via built-in antennas.
What is not applicable to RFID tags?
RFID tags cannot be inactive, they must respond or be powered by readers or interrogator signals.
_________________ are typically used in logistics and inventory management apps while ____________________ are typically used to monitor physical or environmental conditions.
RFID technology is widely used in supply chain management..
WSNs are wireless sensor networks that are used to monitor conditions.
You might also like...
Chapters 1-3 IT
CIS Test 2
Information Systems Management 3003 Exam 2
Other sets by this creator
Integrated Physical Sciences
C100 - Introduction to Humanities
C713 - Business Law
C712 Unit 5 Quiz
Other Quizlet sets
Enlightenment and Rev. study guide
FINC 341 Test 1 Theory
Brit Lit II Midterm
AVS 101 Test 3