What is the first step you should take in managing data for a firm?
A) Identify the data needed to run the business
An example of a pre-digital database is
Library’s card catalog
Which of the following best illustrates the relationship between entities and attributes?
C) relational DBMS.
What are the relationships that the relational database is named for?
Relationships between entities
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute ADDRESS
A characteristic or quality describing an entity is called a(n):
The most basic business database is comprised of:
five tables: for customers, employees, suppliers, products, and sales.
In a table for customers, the information about a single customer would reside in a single:
In a relational database, a record is also called a(n):
A field identified in a table as holding the unique identifier of the table’s records is called the:
Primary Key
A field identified in a record as holding the unique identifier for that record is called the:
Key Field
A schematic of the entire database that describes the relationships in a database is called a(n):
Entity-Relationship Diagram
A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
In two short marks
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends:
with a crow’s foot preceded by a short mark
A table that links two tables that have a many-to-many relationship is often called a(n):
Intersection Relation
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
A DBMS makes the:
shows how data are organized and structured on the storage media.
Which of the following is not a typical feature of DBMS?
Query wizard tool
Oracle Database Lite is a
DBMS for small handheld computing devices.
Access is a:
DBMS for desktop systems.
MySQL is a:
popular open-source DBMS.
Microsoft SQL Server is a(n):
DBMS for midrange computers.
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join.
The select operation:
creates a subset consisting of all records in the file that meets stated criteria.
The join operation
combines relational tables to provide the user with more information than is otherwise available.
The project operation:
creates a subset consisting of columns in a table
The data dictionary serves as an important data management tool by
creating an inventory of data definitions contained in the database
An automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the
data dictionary.
The specialized language programmers use to add and change data in the database is called:
data manipulation language.
The most prominent data manipulation language today is
DBMS typically include report-generating tools in order to:
display data in an easier-to-read format.
The type of database management approach that can handle multimedia is the:
object-oriented DBMS.
Which of the following database types is useful for storing Java applets as well as handling large numbers of transactions?
Object-relational DBMS
A data warehouse is composed of:
both historical and current data.
Which of the following statements about data warehouses is not true?
Data warehouse systems provide easy-to-use tools for managers to easily update data.
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:
it typically focuses on a single subject area or line of business.
Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as:
business intelligence.
The tool that enables users to view the same data in different ways using multiple dimensions is:
OLAP is a tool for enabling:
users to obtain online answers to ad hoc questions in a rapid amount of time
Data mining is a tool for allowing users to:
find hidden relationships in data.
In terms of the data relationships found by data mining, associations refers to:
occurrences linked to a single event.
In terms of the data relationships found by data mining, sequences refers to:
events linked over time
An alternative to using application server software for interfacing between a Web server and back-end databases is:
Businesses use ________ tools to search and analyze unstructured data sets, such as e-mails and memos.
Text Mining
The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources.
Data Redundancy
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called:
Data Scrubbing
Which of the following would you use to find patterns in user interaction data recorded by Web servers?
Web usage mining
Which of the following would you use to find out which Web sites with content related to database design were the most often linked to by other Web sites?
Web structure mining
Which of the following is not a true statement about MDM?
It is a quality-of-data concept that is used to identity a company’s most important data
The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n):
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called:
Packet Switching
The telephone system is an example of a ________ network.
Which of the following is not a characteristic of packet switching?
Packet switching requires point-to-point circuits.
In TCP/IP, IP is responsible for:
disassembling and reassembling of packets during transmission.
In a telecommunications network architecture, a protocol is:
a standard set of rules and procedures for control of communications in a network.
What are the four layers of the TCP/IP reference model?
Application, transport, Internet, and network interface
Which signal types are represented by a continuous waveform?
To use the analog telephone system for sending digital data, you must also use:
A modem
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Peer-to-peer network
In a bus network:
Signals are broadcast in both directions to the entire network
All network components connect to a single hub in a ________ topology.
The most common Ethernet topology is:
A network that spans a city, and sometimes its major suburbs as well, is called a:
A network that covers entire geographical regions is most commonly referred to as a(n):
Wide area network
________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
Cell Phones
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video.
T lines:
are high-speed, leased data lines providing guaranteed service levels.
Which protocol is the Internet based on?
What service converts IP addresses into more recognizable alphanumeric names?
The child domain of the root is the:
top-level domain
In the domain name “”, what are the root, top-level, second-level, and third-level domains, respectively?
“.”,com, blogging, myspace
Which organization helps define the overall structure of the Internet?
IPv6 is being developed in order to:
Create more IP addresses
Which of the following services enables logging on to one computer system and working on another?
Instant messaging is a type of ________ service.
The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies:
may need to maintain a database of acceptable Web sites.
________ integrate(s) disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience.
Unified Communications
is an encrypted private network configured within a public network.
Web browser software requests Web pages from the Internet using which protocol?
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):
uniform resource locator
The most common Web server today, controlling 46 percent of the market, is:
Microsoft IIS
What technology allows people to have content pulled from Web sites and fed automatically to their computers?
The process of employing techniques to help a Web site achieve a higher ranking with the major search engines is called:
Which of the following statements is not true about search engines?
They have solved the problem of how users instantly find information on the Internet.
Which of the following is the first generation of cellular systems suitable for wireless broadband Internet access?
transmits over several frequencies
The most appropriate wireless networking standard for creating PANs is:
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
The Wi-Fi 802.11a standard can transmit up to:
54 Mbps in the 5-GHz frequency range.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
The IEEE standard for the WiMax is:
IEEE 802.16.
The WiMax standard can transmit up to a distance of approximately:
30 meters
Passive RFID tags:
are used in automated toll-collection systems.
Based on your reading of the examples in the chapter, what would be the best use of RFID for a business?
Managing the supply chain
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.
Large amounts of data stored in electronic form are ________ than the same data in manual form.
vulnerable to many more kinds of threats
Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:
have the potential to be accessed by large numbers of people and by groups outside of the organization.
Specific security challenges that threaten the communications lines in a client/server environment include:
tapping; sniffing; message alteration; radiation
Specific security challenges that threaten clients in a client/server environment include:
unauthorized access; errors; spyware.
Specific security challenges that threaten corporate servers in a client/server environment include:
hacking; vandalism; denial of service attacks.
The Internet poses specific security problems because:
it was designed to be easily accessible.
Which of the following statements about the Internet security is not true?
VoIP is more secure than the switched voice network.
An independent computer program that copies itself from one computer to another over a network is called a:
A salesperson clicks repeatedly on the online ads of a competitor’s in order to drive the competitor’s advertising costs up. This is an example of:
click fraud.
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor’s site, a small program called Mitglieder was downloaded to the user’s machine. The program enabled outsiders to infiltrate the user’s machine. What type of malware is this an example of?
Trojan Horse
Redirecting a Web link to a different address is a form of:
A keylogger is a type of:
Hackers create a botnet by:
by infecting corporate servers with “zombie” Trojan horses that allow undetected access through a back door.
Using numerous computers to inundate and overwhelm the network from numerous launch points is called a ________ attack.
Which of the following is not an example of a computer used as a target of crime?
Illegally accessing stored electronic communication
Which of the following is not an example of a computer used as an instrument of crime?
Breaching the confidentiality of protected computerized data
Phishing is a form of:
An example of phishing is
setting up a fake medical Web site that asks users for confidential information.
Evil twins are
bogus wireless network access points that look legitimate to users.
Pharming involves:
redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser.
You have been hired as a security consultant for a law firm. Which of the following constitutes the greatest source of security threats to the firm?
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called:
Social engineering
How do software vendors correct flaws in their software after it has been distributed?
Issue patches
The HIPAA Act of 1997
D) outlines medical security and privacy rules.
The Gramm-Leach-Bliley Act:
requires financial institutions to ensure the security of customer data.
The Sarbanes-Oxley Act:
imposes responsibility on companies and management to safeguard the accuracy of financial information.
The most common type of electronic evidence is:
Electronic evidence on computer storage media that is not visible to the average user is called ________ data.
Application controls:
can be classified as input controls, processing controls, and output controls
________ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
Data security
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)
Risk assessment
Statements ranking information risks and identifying security goals are included in a(n):
Security Policy
An analysis of the firm’s most critical systems and the impact a system’s outage would have on the business is included in a(n):
business impact analysis.
Rigorous password systems
may hinder employee productivity
An authentication token is a(n):
gadget that displays passcodes.
Biometric authentication:
can use a person’s voice as a unique, measurable trait.
A firewall allows the organization to:
enforce a security policy on traffic between its network and the Internet.
In which technique are network communications are analyzed to see whether packets are part of an ongoing dialogue between a sender and a receiver?
Stateful inspection
________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.
Intrusion detection systems
Currently, the protocols used for secure information transfer over the Internet are
Most antivirus software is effective against:
only those viruses already known when the software is written
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Symmetric key encryption
A digital certificate system:
uses third-party CAs to validate a user’s identity.
Downtime refers to periods of time in which a:
computer system is not operational.
For 100% availability, online transaction processing requires:
fault-tolerant computer systems.
In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-priority data from high-priority data.
deep-packet inspection
The development and use of methods to make computer systems resume their activities more quickly after mishaps is called:
recovery oriented computing.
Smaller firms may outsource some or many security functions to:
Which of the following is not a true statement about MDM?
It is a quality-of-data concept that is used to identity a company’s most important data.