Search
Info
Warning
Danger

Study Resources (Accounting)

71) Which of the following is an open-source operating system designed for mobile devices? A) iOS B) OS X C) Chrome D) Android 72) Nanotechnology uses individual atoms and molecules to create computer chips and other devices that are thousands of times smaller than current technologies permit. 73) A(n) ________ allows users to interact with a.
1 Views
View Answer
21) ________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. A) "Security" B) "Controls" C) "Benchmarking" D) "Algorithms" 22) ________ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of.
0 Views
View Answer
61) What is the foundation technology for Web services? A) HTML B) XML C) SOAP D) UDDI 62) A set of self-contained services that communicate with each other to create a working software application is called: A) Web services. B) enterprise integration. C) SOA. D) ERP. 63) ChicagoCrime.org, which combines Google Maps with crime data for the city of Chicago,.
0 Views
View Answer
41) Access is a: A) DBMS for small handheld computing devices. B) popular open-source DBMS. C) DBMS for midrange computers. D) DBMS for desktop PC systems. 42) In clustering, a data mining tool will: A) find new groupings within data. B) find related predictions from existing values. C) find several events grouped by time. D) find new associations. 43) MySQL.
0 Views
View Answer
41) The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A) bps. B) Hertz. C) baud. D) gigaflops. 42) Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) are very-high-speed data lines typically leased.
1 Views
View Answer
61) ________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors. A) Stateful inspections B) Intrusion detection systems C) Application proxy filtering technologies D) Packet filtering technologies 62) Currently, the protocols used for secure information transfer over the Internet.
0 Views
View Answer
41) Evil twins are: A) Trojan horses that appears to the user to be a legitimate commercial software application. B) e-mail messages that mimic the e-mail messages of a legitimate business. C) fraudulent Web sites that mimic a legitimate business's Web site. D) bogus wireless network access points that look legitimate to users. 42) Pharming.
1 Views
View Answer
21) MongoDB and SimpleDB are both examples of: A) Open-source databases. B) SQL databases. C) NoSQL databases. D) Cloud databases. 22) An example of a pre-digital database is a: A) library's card-catalog. B) cash register receipt. C) doctor's office invoice. D) list of sales totals on a spreadsheet. 23) What is the first step you should take in managing data.
0 Views
View Answer
85) One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity? 86) What are the major issues concerning.
0 Views
View Answer
11) The distributed nature of cloud computing makes it somewhat easier to track unauthorized access. 12) Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years. 13) An acceptable use policy defines the acceptable level.
0 Views
View Answer
1) Smartphones have the same security flaws as other Internet-connected devices. 2) In 2013, the security firm McAfee identified approximately 35,000 kinds of mobile malware. 3) Viruses can be spread through e-mail. 4) The term cracker is used to identify a hacker whose specialty is breaking open security systems. 5) To secure mobile devices,.
7 Views
View Answer
51) Application controls: A) can be classified as input controls, processing controls, and output controls. B) govern the design, security, and use of computer programs and the security of data files in general throughout the organization. C) apply to all computerized applications and consist of a combination of hardware, software, and manual procedures.
0 Views
View Answer
21) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): A) hub. B) switch. C) router. D) NIC. 22) The Internet is based on which three key technologies? A) TCP/IP, HTML, and HTTP B) TCP/IP, HTTP, and packet switching C) Client/server computing, packet switching,.
1 Views
View Answer
11) Hypertext markup language specifies how text, graphics, video, and sound are placed on a document. 12) HTML5 is the latest evolution of HTML, and is designed to make it much easier to embed third-party add-ons, such as Flash animations, in web pages. 13) Web services can exchange information between two different.
0 Views
View Answer
21) In a(n) ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A) scalable B) quantum C) autonomic D) hybrid cloud 22) Software that manages the resources of the computer is called: A) system software. B) application software. C).
0 Views
View Answer
51) You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table? A) one-to-many B) one-to-one C) many-to-many D) many-to-one 52).
0 Views
View Answer
31) The business case for using grid computing involves all of the following except: A) cost savings. B) centralized maintenance. C) speed of computation. D) agility. 32) In client/server computing, the client is: A) the computer that acts as the user point of entry. B) the location of the bulk of the processing. C) software program used for.
0 Views
View Answer
61) The most common source of business system failure is: A) software bugs. B) software errors. C) hardware or facilities failures. D) data quality. 62) Flash cookies are different from ordinary cookies in that they: A) are installed only at the user's request. B) are not stored on the user's computer. C) cannot be easily detected or deleted. D).
4 Views
View Answer
1) Telephone networks are fundamentally different from computer networks. 2) Increasingly, voice, video, and data communications are all based on Internet technology. 3) To create a computer network, you must have at least two computers. 4) An NOS must reside on a dedicated server computer in order to manage a network. 5) A hub.
4 Views
View Answer
11) The Copyright Office began registering software programs in the 1990s. 12) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a product. 13) According to the courts, the creation of software, unique concepts, general functional features, and even colors are.
1 Views
View Answer
31) Which type of network is used to connect digital devices within a half-mile or 500-meter radius? A) Microwave B) LAN C) WAN D) MAN 32) Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? A) Peer-to-peer B) Wireless C) LAN D) Ring 33) Which type of.
1 Views
View Answer
71) Relational database systems use ________ to ensure that relationships between coupled tables remain consistent. A) intersection relations B) referential integrity rules C) entity-relationship diagrams D) foreign keys 72) A DBMS is special software for creating, storing, organizing, and accessing data from a database. 73) A physical view shows data as it is organized on the.
0 Views
View Answer
1) IT infrastructure technology is the set of physical devices required to operate the entire enterprise. 2) Today, most system and application software is custom built by in-house programmers. 3) Systems integration means ensuring the legacy systems work with new elements of the infrastructure. 4) A mainframe is a type of legacy workstation. 5).
3 Views
View Answer
81) Describe the five major categories of IT infrastructure and provide an example of each. 82) An international ad hoc group of climatologists and oceanographers needs to set up a system to analyze massive amounts of data on ocean temperatures, collected hourly by hundreds of ships worldwide. What types of hardware.
0 Views
View Answer
21) Which of the following best describes how new information systems result in legal gray areas? A) They work with networked, electronic data, which are more difficult to control than information stored manually. B) They result in new situations that are not covered by old laws. C) They are implemented by technicians rather.
0 Views
View Answer
71) A ________ is special software that routes and manages communications on the network and coordinates networks resources. A) switch B) firewall C) server D) network operating system/NOS 72) A router is a device that forwards packets of data through different networks, ensuring that the data gets to the right address. 73) Prior to the development.
1 Views
View Answer
41) Which of the following is not a type of output device? A) Speakers B) Cathode ray tube C) Ink jet printer D) Keyboard 42) Virtualization: A) allows one operating system to manage several physical machines. B) has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C) can boost server utilization.
0 Views
View Answer
31) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: A) due process. B) accountability. C) the courts of appeal. D) the judicial system. 32) The practice in law-governed societies in which laws are known and understood, and there is an ability to appeal to.
0 Views
View Answer
41) The Federal Trade Commission FIP principle of Notice/Awareness states that: A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there.
0 Views
View Answer
51) Instant messaging is a type of ________ service. A) chat B) cellular C) e-mail D) wireless 52) Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact.
2 Views
View Answer