Search
Info
Warning
Danger

Study Resources (Accounting)

165) ________ connections provided by cable television vendors use digital cable coaxial lines to deliver high-speed Internet access to homes and businesses. 166) The ________ is the English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet. 167) ________ technology delivers voice.
0 Views
View Answer
1) Telephone networks are fundamentally different from computer networks. 2) Increasingly, voice, video, and data communications are all based on Internet technology. 3) Firms in the past used two fundamentally different types of networks: telephone networks and computer networks. 4) Due to continuing telecommunications deregulation and information technology innovation, telephone and computer.
3 Views
View Answer
21) Wide-area networks (WAN) is a network that spans a metropolitan area, usually a city and its major suburbs. 22) Metropolitan-area network (MAN)span broad geographical distances–entire regions, states, continents, or the entire globe. 23) Twisted wire consists of strands of copper wire twisted in pairs and is an older.
0 Views
View Answer
138) ________ is where the same attribute may have different values. 139) ________ refers to the coupling of data stored in files and the specific programs required to update and maintain those files so that changes in programs require changes to the data. 140) Because pieces of information in different.
0 Views
View Answer
11) IP refers to the Internet Protocol (IP), establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent. 12) A digital signal is represented by a continuous waveform that passes through a communications medium; analog signals are used for voice communication. 13) A analog.
0 Views
View Answer
87) Instant messaging is a type of ________ service. A) chat B) cellular C) Web D) wireless 88) The need in some cases for employees to have access to sexually explicit material on the Internet, such as medical researchers, suggests that companies A) cannot restrict Internet use. B) need specialized software to determine which types.
0 Views
View Answer
116) Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control. A) inside B) within C) outside D) internal to 117) Smartphones share the same security ________ as other Internet devices and are vulnerable to malicious software and penetration from outsiders. A) strengths B).
0 Views
View Answer
96) Application controls A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and.
1 Views
View Answer
1) The potential for unauthorized access is usually limited to the communications lines of a network. 2) Large public networks, such as the Internet, are less vulnerable than internal networks because they are virtually open to anyone. 3) Malicious software programs are referred to as badware and include a variety.
3 Views
View Answer
66) ________ defects cannot be achieved in larger programs. A) Two B) One hundred C) Thirty D) Zero 67) Many firms are reluctant to spend heavily on security because it is not directly related to ________. A) sales expense B) sales forecasting C) sales tax D) sales revenue 68) ________ govern the design, security, and use of computer.
0 Views
View Answer
67) Which type of network is used to connect digital devices within a half-mile or 500-metre radius? A) microwave B) LAN C) WAN D) MAN 68) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A) peer-to-peer B) wireless C) LAN D) ring 69) Which type of.
5 Views
View Answer
51) Internet2 and Next-Generation Internet (NGI) are consortia representing 200 universities, private businesses, and government agencies in the United States working on a new, robust, high-bandwidth version of the Internet. 52) Proponents of net neutrality also argue that a neutral Internet encourages everyone to innovate without permission from the phone and.
0 Views
View Answer
129) A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as ________. 130) ________ refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. 131) ________ are methods, policies,.
0 Views
View Answer
94) DBMS typically include report-generating tools in order to A) retrieve and display data. B) display data in an easier-to-read format. C) display data in graphs. D) perform predictive analysis. 95) The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called A) normalization. B) data scrubbing. C) data cleansing. D) data defining. 96) A schematic of.
0 Views
View Answer
106) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies 107) Currently, the protocols used for secure information transfer over the.
0 Views
View Answer
97) Which generation of network are wireless cellular phone systems entering? A) 2.5G B) 3G C) 3.5G D) 4G 98) CDMA A) is the major European digital cellular standard. B) is more expensive than GSM. C) transmits over several frequencies. D) uses the 1.9 GHz band. 99) The most appropriate wireless networking standard for creating.
0 Views
View Answer
178) A relational database organizes data in the form of ________-dimensional tables. 179) ________ mining is the discovery of patterns and relationships from large sets of unstructured data–the kind of data we generate in e-mails, phone conversations, blog postings, online customer surveys, and tweets. 180) The select, join, and project operations enable.
0 Views
View Answer
135) The ________ is special software that routes and manages communications on the network and coordinates networks resources. 136) Firms in the past used two fundamentally different types of ________: telephone and computer. 137) Due to continuing telecommunications ________ and information technology innovation, telephone and computer networks are slowly converging.
0 Views
View Answer
189) Identify and describe three basic operations used to extract useful sets of data from a relational database. 190) Describe the ways in which database technologies could be used by an office stationery supply company to achieve low-cost leadership. 191) Describe the ways in which database technologies could be used by an.
0 Views
View Answer
104) Data mining is a tool for allowing users to A) quickly compare transaction data gathered over many years. B) find hidden relationships in data. C) obtain online answers to ad hoc questions in a rapid amount of time. D) summarize massive amounts of data into much smaller, traditional reports. 105) In terms of data.
0 Views
View Answer
127) Proponents of ________ also argue that a neutral Internet encourages everyone to innovate without permission from the phone and cable companies or other authorities, and this level playing field has spawned countless new businesses. A) net neutrality B) net duality C) net reality D) net fairness 128) ________ believe regulation to enforce net neutrality.
0 Views
View Answer
86) Which of the following is NOT an example of a computer used as an instrument of crime? A) theft of trade secrets B) intentionally attempting to intercept electronic communication C) unauthorized copying of software D) breaching the confidentiality of protected computerized data 87) Phishing is a form of A) spoofing. B) spinning. C) snooping. D) sniffing. 88) Phishing.
0 Views
View Answer
41) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. 42) SSL is a protocol used to establish a secure connection between two computers. 43) Public key encryption uses two keys. 44) Fault-tolerant computers contain redundant hardware, software, and power supply components. 45) High-availability computing.
0 Views
View Answer
21) Output controls check data for accuracy and completeness when they enter the system. 22) A risk audit includes statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals. 23) Disaster recovery planning devises plans for the restoration of computing and communications services before they.
0 Views
View Answer
175) ________ is the dominant LAN standard at the physical network level. 176) A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. 177) The backbone networks of the Internet are typically owned by long-distance telephone companies called ________. 178).
0 Views
View Answer
114) A relational database organizes data in the form of ________-dimensional tables. A) three B) tiered C) two D) cubed 115)  ________ mining is the discovery of patterns and relationships from large sets of unstructured data–the kind of data we generate in e-mails, phone conversations, blog postings, online customer surveys, and tweets. A) Data B) Web C) Text D).
5 Views
View Answer
168) A(n) ________ view shows data as it is actually organized and structured on the data storage media. 169) DBMS have a(n) ________ capability to specify the structure of the content of the database. 170) In ________, a data mining tool discovers different groupings within data, such as finding affinity groups for.
0 Views
View Answer
57) A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a A) hub. B) switch. C) router. D) NIC. 58) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet.
0 Views
View Answer
117) Local connection lines are owned by regional ________ that connect retail users in homes and businesses to the Internet. A) network service providers B) telephone and cable television companies C) ISP D) coaxial cable 118) The regional networks lease access to ________. A) network service providers B) telephone and cable television companies C) ISPs,.
0 Views
View Answer
155) In a ________, one station transmits signals, which travel in both directions along a single transmission segment. 156) ________ span broad geographical distances–entire regions, states, continents, or the entire globe. 157) A ________ is a network that spans a metropolitan area, usually a city and its major suburbs. Its geographic.
0 Views
View Answer
11) Computer crime is defined as "any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs." 12) Identity theft is a crime in which an imposter obtains key pieces of personal information, such as social.
0 Views
View Answer
197) What types of capabilities does the Internet provide businesses and what Internet protocols or technologies support these? Which have proven the most valuable to businesses thus far? 198) What are the business advantages of using voice over IP (VoIP) technology? 199) Describe and explain the idea of "network neutrality." Are you.
0 Views
View Answer
128) Databases record information about general categories of information referred to as ________. 129) A grouping of characters into a word, a group of words, or a complete number (such as a person's name or age) is called a ________. 130) A ________ represents the smallest unit of data a computer can.
0 Views
View Answer
77) The total amount of digital information that can be transmitted through any telecommunications medium is measured in A) bps. B) Hertz. C) baud. D) gigaflops. 78) Digital subscriber lines A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically.
0 Views
View Answer
149) ________ defects cannot be achieved in larger programs. 150) Many firms are reluctant to spend heavily on security because it is not directly related to ________. 151) ________ controls are specific controls unique to each computerized application, such as payroll or order processing. 152) ________ controls establish that data.
0 Views
View Answer
76) Specific security challenges that threaten the communications lines in a client/server environment include A) tapping; sniffing; message alteration; radiation. B) hacking; vandalism; denial of service attacks. C) theft, copying, alteration of data; hardware or software failure. D) unauthorized access; errors; spyware. 77) Specific security challenges that threaten clients in.
0 Views
View Answer
145) ________ establishes a connection between the computers, sequences the transfer of packets, and acknowledges the packets sent. 146) IP refers to the Internet Protocol (IP), which is responsible for the ________ of packets and includes the disassembling and reassembling of packets during transmission. 147) The ________ layer is responsible.
0 Views
View Answer
190) How does packet switching work? 191) Describe the principal components of telecommunications networks and key networking technologies? 192) Murray is trying to decide what type of telecommunication transmission media and what type of network he might use at the University of Lethbridge. Murray goes to the IS faculty to learn about.
0 Views
View Answer
158) The ________ database design describes how the data elements in the database are to be grouped. 159) The process of creating small, stable, yet flexible and adaptive data structures from complex groups of data is called ________. 160) Database designers document their data model with ________. 161) A line connecting two.
0 Views
View Answer
56) ________ is/are methods, policies, and organizational procedures ensuring the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms" 57) John clicks into his online banking Web site. He is already to type in his password when he.
0 Views
View Answer