Exam Flashcards
Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A) Networking B) Telephone C) VOIP D) Telecommunications E) Data management
D) Telecommunications
Which of the following is not an IT infrastructure service component?
A) Operating system software
B) Computing platforms to provide a coherent digital environment
C) Physical facilities management to manage the facilities housing physical components
D) IT management services to plan and develop the infrastructure and provide project management
E) IT education services that provide training to employees
A) Operating system software
Specifications that establish the compatibility of products and the ability to communicate in a network are called: A) network standards. B) telecommunications standards. C) technology standards. D) Internet standards. E) compatibility standards.
C) technology standards.
Which of the following is a leading networking hardware provider? A) Dell B) Intel C) Seagate D) IBM E) Cisco
E) Cisco
Software that manages the resources of the computer is called: A) operating system software. B) application software. C) data management software. D) network software. E) web services software.
A) operating system software.
A SAN is a \_\_\_\_\_\_\_\_ network. A) server area B) storage area C) scalable architecture D) service-oriented architecture E) software arrangement
B) storage area
Which of the following is an example of a legacy system?
A) Transaction processing system running on a mainframe.
B) Scalable grid computing system
C) Web services running on a cloud computing platform
D) MDM software
E) Quantum computing system
A) Transaction processing system running on a mainframe.
Which of the following is not an example of a wearable computing device? A) Smartwatch B) Smart glasses C) Smartphones D) Activity trackers E) Smart ID badges
C) Smartphones
A(n)\_\_\_\_\_\_\_\_ server is used to communicate between a web server and an organization's back-end systems. A) public server B) private server C) legacy server D) application server E) blade server
D) application server
\_\_\_\_\_\_\_\_ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A) Mainframes B) Rack servers C) Cloud servers D) Hybrid servers E) Blade servers
E) Blade servers
Client/server computing is a primary example of centralized processing.
False
In N-tier computing, significant parts of website content, logic, and processing are performed by different servers.
True
Application server software is responsible for locating and managing stored web pages.
False
IT infrastructure consists of only those physical computing devices required to operate the enterprise.
False
An application server may reside on the same computer as a web server or on its own dedicated computer.
True
The operating system is used to manage the computer’s activities.
True
SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their websites.
False
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer. A) 5, 2, 3, 4, 1 B) 5, 4, 2, 3, 1 C) 4, 5, 2, 3, 1 D) 5, 4, 2, 1, 3 E) 4, 5, 3, 2, 1
B) 5, 4, 2, 3, 1
The introduction of the minicomputer:
A) allowed computers to be customized to the specific needs of departments or business units.
B) strengthened centralized computing.
C) offered new, powerful machines at higher prices than mainframes.
D) represented the rise of Microsoft.
E) was dominated by IBM.
A) allowed computers to be customized to the specific needs of departments or business units.
A client computer networked to a server computer, with processing split between the two types of computers, is called a(n):
A) service-oriented architecture.
B) on-demand architecture.
C) multi-tiered client/server architecture.
D) two-tiered client/server architecture.
E) divided architecture.
D) two-tiered client/server architecture.
In a multi-tiered network:
A) the work of the entire network is centralized.
B) the work of the entire network is balanced over several levels of servers.
C) processing is split between clients and servers.
D) processing is handled by multiple, geographically-remote clients.
E) processing is located in the cloud.
B) the work of the entire network is balanced over several levels of servers.
Interpretations of Moore’s law assert that:
A) computing power will eventually level off.
B) transistors decrease in size 50% every two years.
C) data storage costs decrease by 50% every 18 months.
D) PCs decrease in market share by 9% every 5 years.
E) computing power doubles every 18 months.
E) computing power doubles every 18 months.
Today's nanotechnology-produced computer transistors are roughly equivalent in size to: A) the width of a fingernail. B) a human hair. C) a virus. D) an atom. E) a grain of sand.
C) a virus.
ZipRealty, which combines Google Maps with real estate data, is an example of: A) cloud computing. B) SOA. C) a widget. D) a mashup. E) a web service.
D) a mashup.
Which of the following is a multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms? A) Unix B) Linux C) OS X D) COBOL E) DOS
A) Unix
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A) TCP/IP B) COBOL C) Ethernet D) ASCII E) Linux
C) Ethernet
The development of TCP/IP occurred during the ________ era.
A) cloud and mobile computing
B) general-purpose mainframe and minicomputer
C) client/server era
D) personal computer
E) enterprise computing
E) enterprise computing
Which of the following became the standard PC in the Personal Computer Era? A) Wintel PC B) DOS PC C) MITS PC D) Altair E) Apple II
A) Wintel PC
\_\_\_\_\_\_\_\_ uses individual atoms and molecules to create computer chips and other devices. A) Virtualization B) Nanotechnology C) Quantum computing D) A minicomputer E) On-demand computing
B) Nanotechnology
\_\_\_\_\_\_\_\_ states that the value or power of a network grows exponentially as a function of the number of network members. A) Metcalfe's Law B) Moore's Law C) Law of scalability D) Law of outsourcing E) Law of networks
A) Metcalfe’s Law
\_\_\_\_\_\_\_\_ interfaces allow users to employ one or more fingers to manipulate objects on a screen without a mouse or keyboard. A) Hypertouch B) Nanotech C) Multitouch D) Linux E) Scalable
C) Multitouch
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
True
Which of the following is not an example of the mobile digital platform? A) Tablets B) Kindle C) Cell phones D) CRM E) Apps
D) CRM
All of the following are current hardware platform trends except: A) green computing. B) virtualization. C) cloud computing. D) Unix. E) quantum computing.
D) Unix.
The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A) co-location. B) edge computing. C) grid computing. D) utility computing. E) quantum computing.
E) quantum computing.
Which of the following is a recent addition to the mobile digital platform? A) Quantum computing devices B) Wearable computing devices C) Cloud computing devices D) Grid computing devices E) Green computing devices
B) Wearable computing devices
At what percent of capacity do most servers operate? A) 100% B) 80-90% C) approximately 70 percent D) 40-50% E) 15-20%
E) 15-20%
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A) Cloud computing B) Autonomic computing C) Virtualization D) Multicore processing E) Ubiquitous computing
C) Virtualization
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A) On-demand B) Grid C) Edge D) Autonomic E) Quantum
A) On-demand
All of the following are cloud computing services except: A) infrastructure as a service. B) platform as a service. C) software as a service. D) on-demand computing. E) virtualization as a service.
E) virtualization as a service.
Firms that allow employees to use their own devices are embracing which of the following? A) Wearable computing B) Mobile consolidation C) Cloud computing D) BYOD E) Self computing
D) BYOD
The marketplace for computer hardware:
A) has become increasingly concentrated in top firms.
B) has expanded to include a wide variety of start-up and mobile-computing firms.
C) has moved significantly to Asian firms.
D) has been decimated by mobile and cloud computing.
E) has begun moving away from blade servers.
A) has become increasingly concentrated in top firms.
Which of the following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) iOS E) Unix
B) Android
Which of the following is not one of the NIST defined characteristics of cloud computing? A) Ubiquitous network access B) Location-independent resource pooling C) On-demand self service D) Measured service E) Reduced elasticity
E) Reduced elasticity
Which of the following is not an example of the consumerization of IT? A) Google Apps B) Dropbox C) Facebook D) Gmail E) Amazon Web Services
E) Amazon Web Services
A(n) \_\_\_\_\_\_\_\_ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A) multicore processor B) legacy processor C) scalable processor D) aggregate circuit E) green circuit
A) multicore processor
In green computing, reducing computer power consumption is a top priority.
True
Quantum computing is implemented primarily with enterprise or ISP servers.
False
Which type of software is created and updated by a worldwide community of programmers and available for free? A) Software packages B) Mashups C Outsourced D) Open source E) Closed source
D) Open source
Which of the following is not one of the current software platform trends?
A) Web services and service-oriented architecture
B) Open-source software
C) HTML5
D) Software outsourcing
E) Multicore processors
E) Multicore processors
Linux is:
A) primarily concerned with the tasks of end users.
B) designed for specific machines and specific microprocessors.
C) an example of open-source software.
D) especially useful for processing numeric data.
E) poorly suited to power fast computers.
C) an example of open-source software.
Which of the following statements about Linux is not true?
A) It plays a major role in the back office running local area networks.
B) It is available in free versions downloadable from the Internet.
C) It has garnered 20 percent of the server operating system market.
D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld devices.
E) Linux works on all the major hardware platforms.
C) It has garnered 20 percent of the server operating system market.
Running a Java program on a computer requires:
A) a Java Virtual Machine to be installed on that computer.
B) a Java Virtual Machine to be installed on the server hosting the Java applet.
C) a miniature program to be downloaded to the user’s computer.
D) no specialized software, as Java is platform-independent.
E) the Mozilla Firefox browser and no other browsers.
A) a Java Virtual Machine to be installed on that computer.
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A) service. B) client. C) browser. D) app. E) beacon.
C) browser.
Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as: A) web services. B) EAI software. C) SOA. D) SOAP. E) SaaS.
A) web services.
Which of the following is the foundation technology for web services? A) XML B) HTML C) SOAP D) UDDI E) SCSI
A) XML
Which of the following refers to a set of self-contained services that communicate with each other to create a working software application? A) Web services B) EAI software C) SOA D) SOAP E) Prepackaged software
C) SOA
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A) software packages. B) mashups. C) outsourced software. D) open-source software. E) service level agreements.
A) software packages.
\_\_\_\_\_\_\_\_ are created by combining and customizing components from different online software applications. A) Apps B) Web browsers C) SaaS D) Web services E) Mashups
E) Mashups
The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.
A) outsourcing.
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A) SOA. B) SLA. C) TCO. D) RFQ. E) SaaS.
B) SLA.
SaaS refers to:
A) supplying online access over networks to storage devices and storage area network technology.
B) managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet.
C) self-contained services that communicate with each other to create a working software application.
D) easy-to-use software tools for displaying Web pages.
E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
E) hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
\_\_\_\_\_\_\_\_ provides a standard format for data exchange, enabling web services to pass data from one process to another. A) HTML B) HTML5 C) Java D) Chrome OS E) XML
E) XML
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Capacity planning B) Cloud computing C) Green computing D) Utility computing E) On-demand computing
C) Green computing
The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
True
It is much easier to eliminate a cloud service than to remove functionality from a company’s core internal systems.
True
Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.
True
Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.
False
Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.
True
Hypertext markup language specifies how text, graphics, video, and sound are placed on a web page.
True
A service-oriented architecture is set of self-contained services that communicate with each other to create a working software application.
True
Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.
True
Which of the following factors does not help explain why computing resources today are even more available than in previous decades?
A) Network economics
B) Law of mass digital storage
C) Moore’s law
D) Declining communications costs and the Internet
E) Widespread rejection of technology standards
E) Widespread rejection of technology standards
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modality B) Scalability C) Expandability D) Disintermediation E) Customizability
B) Scalability
Hardware and software acquisition costs account for about \_\_\_\_\_\_\_\_ percent of TCO. A) 20 B) 40 C) 50 D) 75 E) 90
A) 20
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) Supply and demand B) Return on investment C) Breakeven point D) Cost-benefit analysis E) Total cost of ownership
E) Total cost of ownership
How would you determine the market demand for your firm’s IT services?
A) Perform a TCO analysis.
B) Benchmark your services.
C) Hold focus groups to assess your services.
D) Analyze sales returns on key investments.
E) Perform a stress test.
C) Hold focus groups to assess your services.
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
A) Your firm’s business strategy
B) The IT investments made by competitor firms
C) Market demand for your firm’s services
D) Your firm’s organizational culture
E) Information technology assessment
D) Your firm’s organizational culture
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
True
TCO refers to the original cost of purchased technology: both hardware and software.
False
In financial services firms, investments in IT infrastructure represent more than half of all capital invested.
True
Microsoft is the market leader in client/server networking.
True
Cloud computing is the fastest growing form of computing.
True
Exponential growth in the number of transistors and the power of processors is expected to consider for the foreseeable future.
False
Quantum computing is not yet available to the general public.
False
Which of the following best illustrates the relationship between entities and attributes? A) The entity CUSTOMER with the attribute PRODUCT
B) The entity CUSTOMER with the attribute PURCHASE
C) The entity PRODUCT with the attribute PURCHASE
D) The entity PRODUCT with the attribute CUSTOMER
E) The entity PURCHASE with the attribute CUSTOMER
B) The entity CUSTOMER with the attribute PURCHASE
All of the following are issues with the traditional file environment except:
A) data inconsistency.
B) inability to develop specialized applications for functional areas.
C) lack of flexibility in creating ad-hoc reports.
D) poor security.
E) data sharing.
B) inability to develop specialized applications for functional areas.
A characteristic or quality that describes a particular database entity is called a(n): A) field B) tuple C) key field D) attribute E) relationship
D) attribute
A ________ is an example of pre-digital data storage that is comparable to a database.
A) library card catalog
B) cash register receipt
C) doctor’s office invoice
D) list of sales totals on a spreadsheet
E) schedule of due dates on a project outline
A) library card catalog
\_\_\_\_\_\_\_\_ creates confusion that hampers the creation of information systems that integrate data from different sources. A) Batch processing B) Data redundancy C) Data independence D) Online processing E) Data quality
B) Data redundancy
Data \_\_\_\_\_\_\_\_ occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy
A) redundancy
Which of the following occurs when the same attribute in related data files has different values? A) Data redundancy B) Data duplication C) Data dependence D) Data discrepancy E) Data inconsistency
E) Data inconsistency
Which of the following is a grouping of characters into a word, a group of words, or a complete number? A) File B) Table C) Entity D) Field E) Tuple
D) Field
A record is a characteristic or quality used to describe a particular entity.
False
Program-data dependence refers to the coupling of data stored in files and the specific programs required to update and maintain those files such that changes in programs require changes to the data.
True
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems A) Program-data dependence B) Lack of flexibility C) Poor security D) Lack of data sharing E) Data redundancy
B) Lack of flexibility
Which of the following enables a DBMS to reduce data redundancy and inconsistency?
A) Ability to enforce referential integrity
B) Ability to couple program and data
C) Use of a data dictionary
D) Ability to create two-dimensional tables
E) Ability to minimize isolated files with repeated data
E) Ability to minimize isolated files with repeated data
A DBMS makes the:
A) physical database available for different logical views.
B) relational database available for different logical views.
C) physical database available for different analytic views.
D) relational database available for different analytic views.
E) logical database available for different analytic views.
A) physical database available for different logical views.
The logical view of a database:
A) displays the organization and structure of data on the physical storage media.
B) includes a digital dashboard.
C) allows the creation of supplementary reports.
D) enables users to manipulate the logical structure of the database.
E) presents data as they would be perceived by end users.
E) presents data as they would be perceived by end users.
Which of the following is a DBMS for desktop computers? A) DB2 B) Oracle Database C) Microsoft SQL Server D) Microsoft Access E) Microsoft Exchange
D) Microsoft Access
A(n) \_\_\_\_\_\_\_\_ organizes data in two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS
C) relational DBMS
Microsoft SQL Server is a(n): A) DBMS for both desktops and mobile devices. B) Internet DBMS. C) desktop relational DBMS. D) DBMS for midrange computers. E) DBMS for mobile devices.
D) DBMS for midrange computers.
In a table for customers, the information about a single customer resides in a single: A) field. B) row. C) column. D) table. E) entity.
B) row.
In a relational database, a record is referred to in technical terms as a(n): A) tuple. B) table. C) entity. D) field. E) key.
A) tuple.
A field identified in a table as holding the unique identifier of the table's records is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) primary entity.
A) primary key.
A field identified in a record as holding the unique identifier for that record is called the: A) primary key. B) key field. C) primary field. D) unique ID. E) key attribute.
B) key field.
In a relational database, the three basic operations used to develop useful sets of data are: A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select.
C) select, project, and join.
The select operation:
A) combines relational tables to provide the user with more information than is otherwise available.
B) creates a subset consisting of columns in a table.
C) identifies the table from which the columns will be selected.
D) creates a subset consisting of all records in the file that meet stated criteria.
E) creates a subset consisting of rows in a table.
D) creates a subset consisting of all records in the file that meet stated criteria.
The join operation:
A) combines relational tables to provide the user with more information than is otherwise available.
B) identifies the table from which the columns will be selected.
C) creates a subset consisting of columns in a table.
D) organizes elements into segments.
E) creates a subset consisting of rows in a table.
A) combines relational tables to provide the user with more information than is otherwise available.
A) combines relational tables to provide the user with more information than is otherwise available.
B) creates a subset consisting of columns in a table.
C) organizes elements into segments.
D) identifies the table from which the columns will be selected.
E) creates a subset consisting of rows in a table.
B) creates a subset consisting of columns in a table.
Microsoft Access’s data dictionary displays all of the following information about a filed except the:
A) size of the field
B) format of the field.
C) description of the field.
D) type of the field.
E) the organization within the organization that is responsible for maintain the data.
E) the organization within the organization that is responsible for maintain the data.
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A) Data dictionary B) Data definition diagram C) Entity-relationship diagram D) Relationship dictionary E) Data table.
A) Data dictionary
Which of the following is a specialized language that programmers use to add and change data in the database? A) Data access language. B) Data manipulation language. C) Structured query language. D) Data definition language. E) DBMS.
B) Data manipulation language.
Which of the following is the most prominent data manipulation language today? A) Access B) DB2 C) SQL D) Crystal Reports E) NoSQL
C) SQL
DBMSs typically include report-generating tools in order to:
A) retrieve and display data.
B) display data in an easier-to-read format.
C) display data in graphs.
D) perform predictive analysis.
E) analyze the database’s performance.
B) display data in an easier-to-read format.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A) normalization. B) data scrubbing. C) data cleansing. D) data defining. E) optimization.
A) normalization.
A schematic of the entire database that describes the relationships in a database is called a(n): A) data dictionary. B) intersection relationship diagram. C) entity-relationship diagram. D) data definition diagram. E) data analysis table.
C) entity-relationship diagram.
A one-to-many relationship between two entities is symbolized in a diagram by a line that ends with: A) one short mark. B) two short marks. C) three short marks. D) a crow's foot. E) a crow's foot topped by a short mark.
E) a crow’s foot topped by a short mark.
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A) Address B) City C) Airport code D) State E) Day
C) Airport code
The logical and physical views of data are separated in a DBMS.
True
Every record in a file should contain at least one key field.
True
NoSQL technologies are used to manage sets of data that don’t require the flexibility of tables and relations.
True
CGI is a DBMS programming language that end users and programmers use to manipulate data in the database.
False
Complicated groupings of data in a relational database need to be adjusted to eliminate awkward many-to-many relationships.
True
A physical view shows data as it is actually organized and structured on the data storage media.
True
DBMS have a data definition capability to specify the structure of the content of the database.
True
Relational DBMSs use key field rules to ensure that relationships between coupled tables remain consistent.
False
The term big data refers to all of the following except:
A) datasets with fewer than a billion records.
B) datasets with unstructured data.
C) machine-generated data (i.e. from sensors).
D) data created by social media (i.e. tweets, Facebook Likes).
E) data from Web traffic.
A) datasets with fewer than a billion records.
Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A) OLAP B) Data warehouse C) Data mart D) Hadoop E) DBMS
D) Hadoop
Which of the following is not one of the techniques used in web mining? A) Content mining B) Structure mining C) Server mining D) Usage mining E) Data mining
C) Server mining
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast
C) Identify sequences
You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do this, you will the data mining software you are using to do which of the following? A) Identify associations B) Identify clusters C) Identify sequences D) Classify data E) Create a forecast
D) Classify data
A data warehouse is composed of: A) historical data from legacy systems. B) current data. C) internal and external data sources. D) historic and current internal data. E) historic external data.
D) historic and current internal data.
All of the following are technologies used to analyze and manage big data except: A) cloud computing. B) noSQL. C) in-memory computing. D) analytic platforms. E) Hadoop.
A) cloud computing.
A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A) Text mining tools B) Sentiment analysis software C) Web mining technologies D) Data mining software E) Data governance software
B) Sentiment analysis software
Which of the following tools enables users to view the same data in different ways using multiple dimensions? A) Predictive analysis B) SQL C) OLAP D) Data mining E) Hadoop
C) OLAP
OLAP enables:
A) users to obtain online answers to ad-hoc questions in a rapid amount of time.
B) users to view both logical and physical views of data.
C) programmers to quickly diagram data relationships.
D) programmers to normalize data.
E) users to quickly generate summary reports.
A) users to obtain online answers to ad-hoc questions in a rapid amount of time.
Data mining allows users to:
A) quickly compare transaction data gathered over many years.
B) find hidden relationships in data.
C) obtain online answers to ad-hoc questions in a rapid amount of time.
D) summarize massive amounts of data into much smaller, traditional reports.
E) access the vast amounts of data in a data warehouse.
B) find hidden relationships in data.
In the context of data relationships, the term associations refers to:
A) events linked over time.
B) patterns that describe a group to which an item belongs.
C) occurrences linked to a single event.
D) undiscovered groupings.
E) relationships between different customers.
C) occurrences linked to a single event.
\_\_\_\_\_\_\_\_ tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A) OLAP B) Text mining C) In-memory D) Clustering E) Classification
B) Text mining
Which of the following enables you to create a script that allows a web server to communicate with a back-end database? A) CGI B) HTML C) Java D) SQL E) NoSQL
A) CGI
HTML has become the preferred method of communicating with back-end databases because it is a cross-platform language.
False
Legacy systems are used to populate and update data warehouses.
True
Multiple data marts are combined and streamlined to create a data warehouse.
False
You can use OLAP to perform multidimensional data analysis.
True
OLAP is unable to manage and handle queries with very large sets of data.
False
In-memory computing relies primarily on a computer (RAM) for data storage.
True
Middleware is an application that transfers information from an organization’s internal database to a web server for delivery to a user as part of a web page.
True
Implementing a web interface for an organization’s internal database usually requires substantial changes to be made to the database.
False
You can manipulate data on a web server by using a CGI script.
True
You can use text mining tools to analyze unstructured data, such as memos and legal cases.
True
In a client/server environment, a DBMS is located on a dedicated computer called a web server.
False
Associations are occurrences linked to multiple events.
False
High-speed analytic platforms use both relational and non-relational tools to analyze large datasets.
True
Which of the following is software that handles all application operations between browser-based computers and a company's back-end business applications or databases? A) Database server software B) Application server software C) Web browser software D) Data mining software E) Web server software
B) Application server software
In data mining, which of the following involves using a series of existing values to determine what other future values will be? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
E) Forecasting
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy. B) data definition file. C) data quality audit. D) data governance policy. E) data policy.
A) information policy.
In a large organization, which of the following functions would be responsible for physical database design and maintenance? A) Data administration B) Database administration. C) Information policy administration D) Data auditing E) Database management
B) Database administration.
Which common database challenge is illustrated by a person receiving multiple copies of an L.L. Bean catalog, each addressed to a slightly different variation of his or her full name? A) Data normalization B) Data accuracy C) Data redundancy D) Data inconsistency E) Data duplication
D) Data inconsistency
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A) data auditing. B) defragmentation. C) data scrubbing. D) data optimization. E) data normalization.
C) data scrubbing.
Data cleansing not only corrects errors but also:
A) establishes logical relationships between data.
B) structures data.
C) normalizes data.
D) removes duplicate data.
E) enforces consistency among different sets of data.
E) enforces consistency among different sets of data.
Which of the following is not a method for performing a data quality audit?
A) Surveying entire data files
B) Surveying samples from data files
C) Surveying data definition and query files
D) Surveying end users about their perceptions of data quality
E) Surveying managers about their perceptions of data quality
C) Surveying data definition and query files
The term data governance refers to the policies and processes for managing the integrity and security of data in a firm.
True
In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources? A) Data administration B) Database administration. C) Information policy administration D) Data auditing E) Database management
A) Data administration
Data scrubbing is a more intensive corrective process than data cleansing.
False
In data mining, which of the following involves recognizing patterns that describe the group to which an item belongs by examining existing items and inferring a set of rules? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
C) Classifications
In data mining, which of the following involves events linked over time? A) Associations B) Sequences C) Classifications D) Clustering E) Forecasting
B) Sequences
MongoDB and SimpleDB are both examples of: A) open source databases. B) SQL databases. C) NoSQL databases. D) cloud databases. E) .big data databases.
C) NoSQL databases.
A one-to-one relationship between two entities is symbolized in a diagram by a line that ends:
A) in two short marks.
B) in one short mark.
C) with a crow’s foot.
D) with a crow’s foot topped by a short mark.
E) with a crow’s foot topped by two short marks.
A) in two short marks.
Which of the following would you use to find patterns in user interaction data recorded by a web server? A) Web usage mining B) Web server mining C) Web structure mining D) Web content mining E) Web protocol mining
A) Web usage mining
Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination? A) Hub B) Switch C) Router D) NIC E) Modem
B) Switch
The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP
E) E-mail, instant messaging, and newsgroups
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM. E) Packet switching
E) Packet switching
The telephone system is an example of a \_\_\_\_\_\_\_\_ network. A) peer-to-peer B) wireless C) packet-switched D) circuit-switched E) client/server
D) circuit-switched
Which of the following is not a characteristic of packet switching?
A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
E) Packets are reassembled into the original message when they reach their destinations.
C) Packet switching requires point-to-point circuits.
In TCP/IP, IP is responsible for which of the following?
A) Disassembling and reassembling packets during transmission
B) Establishing an Internet connection between two computers
C) Moving packets over the network
D) Sequencing the transfer of packets
E) Breaking messages down into packets
A) Disassembling and reassembling packets during transmission
Which of the following is the best description of a protocol in a telecommunications network architecture?
A) A device that handles the switching of voice and data in a local area network
B) A standard set of rules and procedures for control of communications in a network
C) A communications service for microcomputer users
D) The main computer in a telecommunications network
E) A pathway through which packets are routed
B) A standard set of rules and procedures for control of communications in a network
What are the four layers of the TCP/IP reference model?
A) Physical, application, transport, and network interface
B) Physical, application, Internet, and network interface
C) Application, transport, Internet, and network interface
D) Application, hardware, Internet, and network interface
E) Software, hardware, network interface, Internet
C) Application, transport, Internet, and network interface
On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) HTTP E) DNS
A) TCP/IP
A(n) \_\_\_\_\_\_\_\_ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. A) modem B) router C) packet D) telnet E) hub
B) router
Computer networks are fundamentally different from telephone networks.
True
An NOS must reside on a dedicated server computer in order to manage a network.
False
A hub is a networking device that is used to filter and forward data to specified destinations on the network.
False
In a client/server network, a network server provides every connected client with an address so it can be found by others on the network.
True
A computer network consists of at least three computers.
False
Central large mainframe computing has largely replaced client/server computing.
False
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.
False
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.
True
More than 200 million Americans access the Internet via mobile devices.
True
In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.
True
TCP/IP was developed in the developed during the early 1970s to support Uefforts to help scientists transmit data among different types of computers over long distances.
True
Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog
E) Analog
To use the analog telephone system for sending digital data, you must also use: A) a modem. B) a router. C) DSL. D) twisted wire. E) TCP/IP.
A) a modem.
Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Wi-Fi B) LAN C) WAN D) MAN E) SAN
B) LAN
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A) MAN B) Wireless C) LAN D) Windows domain network E) Peer-to-peer
E) Peer-to-peer
Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A) MAN B) Domain-based LAN C) Peer-to-peer network D) WAN E) SAN
C) Peer-to-peer network
A network that spans a city, and sometimes its major suburbs, as well, is called a: A) CAN. B) MAN. C) LAN. D) WAN. E) WSN.
B) MAN.
A network that covers entire geographical regions is most commonly referred to as a(n): A) local area network. B) intranet. C) peer-to-peer network. D) wide area network. E) MAN.
D) wide area network.
Bandwidth is the:
A) number of frequencies that can be broadcast through a medium.
B) number of cycles per second that can be sent through a medium.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
D) total number of bytes that can be sent through a medium per second.
E) geographical distance spanned by a network.
C) difference between the highest and lowest frequencies that can be accommodated on a single channel.
The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. E) RPMs.
A) bps.
A(n) \_\_\_\_\_\_\_\_ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital
E) digital
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Fiber-optic cable is more expensive and harder to install than wire media.
True
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
False
Which of the following is not one of the top five search engines? A) Facebook B) Yahoo C) Microsoft Bing D) Ask E) Google
A) Facebook
Digital subscriber lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial cable lines to deliver Internet access.
C) are very-high-speed data lines typically leased from long-distance telephone companies.
D) have up to twenty-four 64-Kbps channels.
E) are assigned to every computer on the Internet.
A) operate over existing telephone lines to carry voice, data, and video.
T1 lines:
A) operate over existing telephone lines to carry voice, data, and video.
B) operate over coaxial lines to deliver Internet access.
C) do not provide guaranteed service levels, but simply “best effort.”
D) have up to twenty-four 64-Kbps channels.
E) are high-speed, leased data lines providing guaranteed service levels.
E) are high-speed, leased data lines providing guaranteed service levels.
What service converts IP addresses into more recognizable alphanumeric names? A) HTML B) FTP C) IP D) HTTP E) DNS
E) DNS
The child domain of the root is called the: A) top-level domain. B) second-level domain. C) host name. D) domain extension. E) mid-tier domain.
A) top-level domain.
In the domain name “http://books.azimuth-interactive.com”, which element is the second-level domain?
A) books
B) azimuth-interactive
C) com
D) none; there is no second-level domain in this name
E) books.azimuth-interactive
B) azimuth-interactive
Which organization helps define the overall structure of the Internet? A) none (no one "owns" the Internet) B) W3C C) ICANN D) The Department of Commerce (U.S.) E) IAB
E) IAB
IPv6 has been developed in order to:
A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
E) reduce excess IP addresses.
B) create more IP addresses.
Predictive search in Google’s search engine:
A) maintains a history of your searches and then predicts what you will search on next.
B) uses a tracking service and cookies on your browser to predict search results.
C) uses a knowledge graph of what similar people searched on to predict your search interests.
D) uses a semantic approach to predict what you are looking for.
E) predicts what you are looking for as you enter words into the query box.
E) predicts what you are looking for as you enter words into the query box.
Instant messaging is a type of \_\_\_\_\_\_\_\_ service. A) chat B) cellular C) e-mail D) wireless E) network
A) chat
\_\_\_\_\_\_\_\_ integrate disparate channels for voice communications, data communications, instant messaging, e-mail, and electronic conferencing into a single experience. A) Wireless networks B) Intranets C) Virtual private networks D) Modems E) Unified communications
E) Unified communications
A VPN:
A) is an encrypted private network configured within a public network.
B) is more expensive than a dedicated network.
C) provides secure, encrypted communications using Telnet.
D) is an Internet-based service for delivering voice communications.
E) is a proprietary networking service technology developed by individual corporations.
A) is an encrypted private network configured within a public network.
Web browser software requests web pages from the Internet using which of the following protocols? A) URL B) HTTP C) DNS D) HTML E) FTP
B) HTTP
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A) uniform resource locator. B) IP address. C) third-level domain. D) root domain. E) child domain.
A) uniform resource locator.
The most common web server today is: A) Microsoft IIS. B) WebSTAR. C) IBM HTTP Server. D) Netscape Server. E) Apache HTTP Server.
E) Apache HTTP Server.
Which of the following pulls content from websites and feeds it automatically to a user’s computers? A) FTP B) RSS C) HTTP D) Bluetooth E) IPv6
B) RSS
Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN. B) IAB. C) SEM. D) SEO. E) RSS.
D) SEO.
Which of the following statements is not true about search engines?
A) They are arguably the Internet’s “killer app.”
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
E) Users are increasingly using search engines on mobile devices.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.
Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining
A) Tunneling
\_\_\_\_\_\_\_\_ monetizes the value of the data stored by search engines. A) TCP/IP B) RSS C) WiMax D) IoT E) SEM
E) SEM
Shopping bots use \_\_\_\_\_\_\_\_ software for searching the Internet. A) Web 2.0 B) Web 3.0 C) intelligent agent D) comparison E) SEO
C) intelligent agent
Which of the following is not a defining feature of Web 2.0? A) Interactivity B) Real-time user control C) Semantic search D) Social participation (sharing) E) User-generated content
C) Semantic search
A(n) \_\_\_\_\_\_\_\_ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A) RSS B) WAN C) NFP D) ISP E) FTP
D) ISP
The backbone networks of the Internet are typically owned by long-distance telephone companies called: A) regional network providers. B) enhanced service providers. C) internet bulk providers. D) backbone providers. E) network service providers.
E) network service providers.
A(n) \_\_\_\_\_\_\_\_ is software for locating and managing stored web pages. A) web server B) net server C) router D) modem E) hub
web pages.
A) web server
Wikis allow visitors to change or add to the original posted material.
True
The Domain Name System (DNS) converts domain names to IP addresses.
True
VoIP technology delivers voice information in digital form using packet switching.
True
Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.
True
Mobile search makes up at more than 50% of all Internet searches.
True
All of the following are physical components of an RFID system except: A) bar codes. B) antennas. C) radio transmitters. D) tags. E) a stationary or handheld device.
A) bar codes.
Which digital cellular standard is used widely throughout the world except the United States? A) GSM B) CDMA C) WLAN D) LTD E) 4G
A) GSM