Information Systems - Part 2 Flashcards

1
Q
What is the correct ascending hierarchy of data in a system?
	A.  	Character, record, file, field.
	B.  	Field, character, file, record.
	C.  	Character, field, record, file.
	D.  	Field, record, file, character.
A

C. Character, field, record, file.

This answer lists the data structures in the correct order. Specifically, a character has fewer pieces of data than does a field. A field has fewer pieces of data than does a record. And a record has fewer pieces of data than does a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following structures refers to the collection of data for all vendors in a relational data base?
	A.  	Record.
	B.  	Field.
	C.  	File.
	D.  	Byte.
A

C. File.

A file would contain the collection of data for all vendors in a relational database. This would also be called a table in a relational database. Therefore, this is the best answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following allows a database management system to add new records, delete old records, and update existing records?
	A.  	Data definition language (DDL).
	B.  	Data manipulation language (DML).
	C.  	Data query language (DQL).
	D.  	Structured query language (SQL).
A

B. Data manipulation language (DML).

The data manipulation language allows the user to add new records, delete old records, and update existing records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following items would be most critical to include in a systems specification document for a financial report?
A. Cost-benefit analysis.
B. Data elements needed.
C. Training requirements.
D. Communication change management considerations.

A

B. Data elements needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following components of a database is responsible for maintaining the referential integrity of the data in the system?
	A.  	Database management system (DBMS)
	B.  	Data query language (DQL).
	C.  	Data manipulation language (DML).
	D.  	Data definition language (DDL).
A

A. Database management system (DBMS)

The database management system (DBMS) controls the storage and retrieval of the information maintained in a database and is responsible for maintaining the referential integrity of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
What is the correct ascending hierarchy of data in a system?
	A.  	Character, record, file, field.
	B.  	Field, character, file, record.
	C.  	Character, field, record, file.
	D.  	Field, record, file, character.
A

C. Character, field, record, file.

This answer lists the data structures in the correct order. Specifically, a character has fewer pieces of data than does a field. A field has fewer pieces of data than does a record. And a record has fewer pieces of data than does a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Database management software is considered: 
	A.  	Outerwear.
	B.  	Software.
	C.  	Middleware
	D.  	B and C.
A

D. B and C.

Database management software is considered both software and middleware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following structures refers to the collection of data for all vendors in a relational data base?
	A.  	Record.
	B.  	Field.
	C.  	File.
	D.     Byte.
A

C. File.

A file would contain the collection of data for all vendors in a relational database. This would also be called a table in a relational database. Therefore, this is the best answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
In a computer-based system, the equivalent of a subsidiary ledger is a
	A.  	Transaction file.
	B.  	Archive file.
	C.  	Master file.
	D.  	Reference file.
A

C. Master file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following sets of characteristics is most closely associated with online real-time processing?
A. Group of transactions, random processing technology, immediate update.
B. Single transaction, sequential processing technology, immediate update.
C. Group of transactions, random processing technology, delayed update.
D. Single transaction, random processing technology, immediate update.

A

D. Single transaction, random processing technology, immediate update.

Online real-time processing is characterized by (1) the processing of one transaction at a time; 2) use of random processing technology, and (3) processing of transactions immediately (as they occur).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following multi-location system structures has the fewest problems with input and output bottlenecks?
	A.  	Centralized.
	B.  	Decentralized.
	C.  	Supercomputers.
	D.  	Networked systems.
A

B. Decentralized.

Decentralization reduces bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following statements about processing methodologies is true?
A. Batch systems, though inexpensive to develop, are much more expensive to operate than online real-time databases.
B. Online real-time processing is especially desirable when transactions occur continuously and are interdependent.
C. The implementation of both batch processing and online real-time processing require access to a networked computer system.
D. Although designed to help ensure accuracy in a batch processing environment, batch control totals are frequently used to control accuracy in online real-time systems as well.

A

B. Online real-time processing is especially desirable when transactions occur continuously and are interdependent.

Online real-time processing is especially desirable when transactions occur continuously and are interdependent. Batch processing is especially desirable when transactions occur periodically and are independent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rollins Corporation uses batch processing for its accounting system. During a recent monthly payroll processing run, it experienced a power failure that corrupted the payroll database.

Which of the following controls will be most useful to the company in recovering from this failure?
	A.  	Batch control totals.
	B.  	Off-site backup files.
	C.  	Checkpoint/restart controls.
	D.  	Hot site.
A

C. Checkpoint/restart controls.

A checkpoint/restart control would be an appropriate way to reprocess only those transactions that took place after the last valid run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
\_\_\_\_\_ systems include redundancy of components.
	A.  	Inefficient.
	B.     Online real-time.
	C.  	Quicken.
	D.  	Fault tolerant.
A

D. Fault tolerant.

A fault tolerant system includes redundant components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Mirroring is
	A.  	Used in flashpoint recovery systems.
	B.  	The creation of duplicate data.
	C.  	A disaster recovery plan.
	D.  	Always onsite.
A

B. The creation of duplicate data.

This is the purpose of mirroring. The purpose of such systems is to distribute excess demand among multiple data sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A rollback and recovery is used mostly in \_\_\_\_\_ systems.
	A.  	Online real-time.
	B.  	Faulty.
	C.  	Batch.
	D.  	General
A

A. Online real-time.

Rollback and recovery procedures are common in online real-time systems. Rollback and recovery is an important backup procedure in which periodic snapshots are taken of a master file and, upon detection of a problem, the system reprocesses all transactions that have occurred since the snapshot.

17
Q
A checkpoint is used mostly in \_\_\_\_\_ systems.
	A.  	Online real time.
	B.  	Faulty.
	C.  	Batch.
	D.  	General.
A

C. Batch.

Checkpoints are mostly used in batch systems. The use of checkpoint and restart is an important backup procedure.

18
Q

In an accounting system, a header can be used to
A. Help format a word processing document.
B. Identify data records.
C. Identify file folders.
D. All of the above.

A

B. Identify data records.

Headers are used to identify data records in an accounting system file.

19
Q

Which of the following is true about denial-of-service attacks?

I. A denial-of-service attack takes advantage of a network communications protocol to tie up the server’s communication ports so that legitimate users cannot gain access to the server.

II. If the denial-of-service attack is successful, the attacker can gain access to unprotected resources on the server.
	A.  	I only.
	B.  	II only.
	C.  	Both I and II.
	D.  	Neither I nor II.
A

A. I only.

A denial-of-service attack prevents legitimate users from accessing the system by flooding the server with hundreds of incomplete access requests.

The object of the attack is to prevent access to the system: the attacker does not actually gain access to information on the system.

20
Q

A fire suppression system in a computer facility
A. Is an application control.
B. Should include ceiling water outlets.
C. Should not include halon chemicals.
D. Is no longer needed in most cases.

A

C. Should not include halon chemicals.

Fire suppression systems in a computer facility should not use halon, because it is an environmental hazard.

21
Q
Internal disk labels are physically read by
	A.  	People.
	B.  	Software.
	C.  	Scanners.
	D.  	Consumers.
A

B. Software.

22
Q

Which of the following is true about denial-of-service attacks?

I. A denial-of-service attack takes advantage of a network communications protocol to tie up the server’s communication ports so that legitimate users cannot gain access to the server.

II. If the denial-of-service attack is successful, the attacker can gain access to unprotected resources on the server.
	A.  	I only.
	B.  	II only.
	C.  	Both I and II.
	D.  	Neither I nor II.
A

A. I only.

A denial-of-service attack prevents legitimate users from accessing the system by flooding the server with hundreds of incomplete access requests.

The object of the attack is to prevent access to the system: the attacker does not actually gain access to information on the system.

23
Q
Which of the following provides the most reliable form of electronic authentication?
	A.  	Digital signature.
	B.  	Symmetric encryption.
	C.  	Asymmetric encryption.
	D.  	Digital certificate.
A

D. Digital certificate.

When a digital certificate is requested, an independent background check is completed to confirm the identity of the requesting entity.

Thus, a digital certificate provides a higher level of reliability than a digital signature.

24
Q
Which of the following solutions creates an encrypted communication tunnel across the Internet for the purpose of allowing a remote user secure access to the network?
	A.  	Packet-switched network.
	B.  	Digital encryption.
	C.  	Authority certificate.
	D.  	Virtual private network
A

D. Virtual private network

A virtual private network (VPN) is a secure way to create an encrypted communication tunnel to allow remote users secure access to a network. The VPN uses authentication to identify users and encryption to prevent unauthorized users from intercepting data.

25
Q

Which of the following is true regarding public/private key encryption?
A. Both the public and private keys can be used to encrypt and decrypt messages.
B. Messages encrypted using public/private key encryption are more difficult to crack (or break) than messages encrypted using private key encryption.
C. Messages are generally encrypted with the sender’s private key so that no one else can decipher the message during transmission.
D. In public/private key encryption, to gain access to the key used to decrypt the message, the recipient must know of the key to use from the sender.

A

A. Both the public and private keys can be used to encrypt and decrypt messages.

Both the public and private keys can be used to encrypt and decrypt messages, although the public key can only decrypt messages encrypted using the private key and vice versa.

26
Q
Which of the following can be used to authenticate messages transmitted in a networked environment?
	A.  	Public/private key encryption.
	B.  	Digital signature.
	C.  	One-time password.
	D.  	Mathematical message digest.
A

B. Digital signature.

A digital signature uses public/private key encryption technology to provide a means of authenticating messages delivered in a networked environment.

27
Q

Which of the following is true in regard to data warehouses?

I. The bulk of the data found in a data warehouse comprises historical operational data.

II. Pattern recognition is one of the principal functionalities offered by data mining software.
	A.  	I only.
	B.  	II only.
	C.  	Both I and II.
	D.  	Neither I nor II.
A

C. Both I and II.

A data warehouse is a database archive of an organization’s operational transactions (sales, purchases, production, payroll, etc.) over a period of years; external data that might be correlated with these transactions, such as economic indicators, stock prices, and exchange rates, are also included.

Pattern recognition is a major component of data mining software: data mining is the process of performing statistical analysis and automatically searching for patterns in large volumes of data.