Final Exam Flashcards

1
Q

You have a spreadsheet with various inputs that are operated on by formulas to provide various outputs. You would like to find an input value (in a cell) that gives you a target output value (in another cell). Which of these is the simplest too you can use for this purpose?

A

Goal Seek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which organization is responsible for coordinating IP addresses globally?

A

Internet Corporation For Assigned Names and Numbers (ICANN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Most of the internet traffic between continents flows on submarine ______ cables

A

fiber optic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP version 4 address are 32 bits long. This means that theoretically there can be no more than ____ computing devices directly to the internet with IP version 4.

A

2^32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All computers connected to the internet must follow the ____ protocol

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All computers directly connected to the internet must have a unique ____ address

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the domain name in the URL http://www.smu.edu.sg/programmes/undergraduate?

A

www.smu.edu.sg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Each packet of data that flows on the internet has

A

IP addresses of the sender and the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a large email message is sent from a computer in the United States to a computer in France over the internet, which of these is likely to be true

A

the message is broken into smaller packets, each packet has the IP addresses of the sender and the receiver, packets are reassembled at the receiver to recreate the original message (all the above)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

According to Kevin Slavin, what percentage of movies on Netflix are rented because of Netflix’s recommendation algorithm?

A

60%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to Kevin Slavin, which of these is an example of an algorithm locked-in with another algorithm in loops?

A

an out-of-print book at amazon listed at millions of dollars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these preceded the development of the World Wide Web?

A

the internet, the TCP/IP protocol, email (all the above)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A course page on isis.uiowa.edu that shows you the current enrollment in the course is an example of

A

Dynamic Web Page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Search engines use a _____ to download pages for their index

A

crawler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you query a search engine it searches ______ to find the matching pages

A

its index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To write a web page you are likely to use

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

While at work you visit a website, browse a few products and then close your browser. You visit the same site a few days later from home and these its seems to remember the products that you had browsed a few days ago. The site is likely using a:

A

persistent cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A cookie is

A

a small piece of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of these raises most privacy concern: session cookie, persistent cookie, HTTP protocol, HTTP request

A

persistent cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When the browser is closed the ______ cookies are deleted

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VLOOKUP function

A

vertical lookup that helps you find specific information in a spreadsheet table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IF function

A

a logical function that returns different values corresponding to the logical test (true or false)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GOAL SEAK

A

allows you to specify a target value for a calculated item, and returns the needed value of the input item to reach that goal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data Validation

A

is used to control the type of data or the values that enter into a cell. You can use this tool to define restrictions on data entry and to prevent users from entering invalid data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

PMT function

A

is used to calculate the payment required each period on a loan/mortgage or investment based on constant payments and a fixed rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Solver

A

is an add-in program that can be used to find the best or optimum solution to a problem involving one or more variables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PMT

A

PMT(Rate, Nper, PV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data Table

A

A one variable data table allows you to compute the result of a formula for various values of an input

29
Q

Scenario Manager

A
  • Scenario manager in excel allows you to create predefined scenarios where each scenario may differ in the values of some inputs
  • You can generate outputs corresponding to each predefined scenario
30
Q

Computer network

A

a collection of interconnected computing devices that can communicate amongst themselves

31
Q

Cable/physical channel

A
  • Twisted pair
  • Coaxial
  • Fiber optic
32
Q

Connectivity hardware

A

the hardware that allows computers to be physically connected to different types of networks

33
Q

Common connectivity hardware

A
  • network interface cards (NICs)
  • routers
  • repeaters
34
Q

Server

A

a powerful computer on a network with programs that provide access to files, printing, communication and other services to users (other computers) on the network

35
Q

Client

A

any computer such as a PC with programs that can request and use services provided by the servers in a network

36
Q

Internet

A

Internet is a network of networks where all devices/computers on the network understand the TCP/IP protocol

  • TCP-transmission control protocol
  • IP- internet protocol
37
Q

Referential integrity

A

the foreign key (e.g., ClientID in event schedule table) can be either null (empty) or one of the primary key values in the parent table (e.g., ClientID in ClientInformation table)

38
Q

Cascade update related fields

A

if a primary key value in the parent table (e.g., ClientInformation table) is changed, corresponding changes are made to the foreign key values in the related table (e.g,. ClientID in Event schedule table)

39
Q

Cascade delete related fields

A

if a record in the parent table is deleted, all records in the related table that reference the primary key of the deleted parent table record are also deleted

40
Q

Ex. A SQL query to find the EventName, StartDate, TotalPrice for events being managed for clients from California (CA)

A

-SELECT EventName, StartDate, TotalPrice
-FROM EventSchedule, ClientInformation
-WHERE EventSchedule.ClientID = ClientInformation.ClientID AND State = ‘CA”
(foreign key=primary key)

41
Q

Multiple tables and conditions

A
  • SELECT ClientName, EventName, TotalPrice
  • FROM EventSchedule, ClientInformation
  • WHERE EventSchedule.ClientID = ClientInformation.ClientID AND TotalPrice > 150000 AND State = ‘CA’;
42
Q

Domain Name System (DNS)

A

maps domain names to IP addresses
-The system is distributed and works through a series of communications between computers to find the IP address for a given domain

43
Q

Finding IP address for a domain name

A

“nslookup” command in Windows (command Prompt) and Mac OS (Terminal) can be used to find the IP address for a given domain

44
Q

Web made possible through

A
  • A hypertext transfer protocol (HTTP)
  • A hypertext markup language (HTML)
  • Browsers and web servers
  • And of course the internet
45
Q

What is HTML

A
  • HTML (Hypertext Markup Language) is the language that is used to create Web Pages
  • A Web browser converts an HTML content into a user-friendly presentation
46
Q

Static Web Pages

A

are delivered to the client exactly as stored on the server. Hence all users (clients) will see exactly the same page when they are requesting using a given URL

47
Q

Dynamic Web Pages

A

are generated by web applications (programs) running on the server. Hence each user (client) may see a different page based on her context/inputs when she requests using a given URL

48
Q

HTTP

A
  • The hypertext transfer protocol is an application level protocol for distributed collaborative hypermedia information systems
  • RFC 2616, the internet society (1999)
  • All of the communication between the browser and the web server is based on HTTP
49
Q

HTTP two types

A

request and response

50
Q

Persistent cookies

A

stored on the browsers side (client side) computer even after the browser is closed

51
Q

Temporary or session cookies

A

stored on the client side temporarily while browser is open. When the browser is closed the cookies is deleted

52
Q

Five factors creating vulnerability

A
  • Today’s interconnected interdependent wirelessly networked business environment
  • Smaller, faster, cheaper computers and storage devises
  • Decreasing skills necessary to be a computer hacker
  • International organized crime taking over cybercrime
  • Lack of management support
53
Q

Malicious software (MALWARE) attacks

A
  • Remote attacks requiring user action
  • Denial of service attack (DoS)
  • Distributed denial of service attack (DDoS)
54
Q

Virus

A

attaches itself to other programs to spread

55
Q

worm

A

replicates and distributes itself through networks

-phising attack

56
Q

Spyware

A

keystoke loggers and screen adapters

57
Q

Denial of service attack (DoS)

A

attacker overwhelms a target computer with a massive number of information requests

58
Q

Distributed Denial of service Attack (DDoS)

A

A DoS attack by first comprising a large number of computers through malicious software and then coordinating them (zombies or botnet) to send massive number of information requests to a target computer

59
Q

access controls

A

authenticaltion and authorization

60
Q

Communication controls

A

firewall, encryption, VPN etc.

61
Q

Encryption

A

the process of encoding messages before they enter a communication channel such that, while in transit, the messages cannot be decoded without special information (key)

62
Q

Brick and mortar

A

these are traditional organizations that server their customers through physical locations ex. Grocery stores car manufacturers

63
Q

Clicks and mortar

A

these are traditional organization that serve through both physical and online presence walmart bestbuy

64
Q

Pure play (virtual)

A

these are organization that serve their customers only through their online presence amazon google

65
Q

A business process can be described with

A

a flowchart

66
Q

Information Systems play a vital role in business processes by supporting

A
  • the execution of the processes
  • the capturing and storing of process data
  • the monitoring of process performance
67
Q

Airbnb is a marketplace that connects owners of an unused space (e.g., a house) with the people who are looking for such space. It is an example of what is called

A

collaborative consumption

68
Q

All computers connected to the internet must follow the

A

TCP/IP protocol