+ All Categories
Home > Documents > dsci 320

dsci 320

Date post: 09-Sep-2014
Category:
Upload: market59
View: 145 times
Download: 0 times
Share this document with a friend
Popular Tags:
57
CHAPTER 5 . An assembly language can contribute to organizational success by providing managers and decision makers with timely, accurate, and relevant information based on data. Tru e Fal se Questio n 2 0 / 1 point A database provides an essential foundation for an organization's information and decision support system. Tru e Fal se Questio n 3 0 / 1 point A database, a DBMS, and the application programs that use the data make up the database environment. Tru e Fal se Questio n 4 0 / 1 point Attributes are usually selected to reflect the relevant characteristics of entities such as employees or customers. Tru e Fal se Questio n 5 0 / 1 point A standardized, uniform approach to database access means that all application programs use the same overall procedures to retrieve data and information.
Transcript
Page 1: dsci 320

CHAPTER 5.An assembly language can contribute to organizational success by providing managers and decision makers with timely, accurate, and relevant information based on data.

True

False

Question 20 / 1

pointA database provides an essential foundation for an organization's information and decision support system.

True

False

Question 30 / 1

pointA database, a DBMS, and the application programs that use the data make up the database environment.

True

False

Question 40 / 1

pointAttributes are usually selected to reflect the relevant characteristics of entities such as employees or customers.

True

False

Question 50 / 1

pointA standardized, uniform approach to database access means that all application programs use the same overall procedures to retrieve data and information.

True

False

Question 60 / 1

pointData modeling usually involves understanding a specific business problem and analyzing the data and information needed to deliver a solution.

True

False

Question 70 / 1

pointER diagrams help ensure that the relationships among the data entities in a database are correctly structured.

True

Page 2: dsci 320

False

Question 80 / 1

pointThe tables in relational databases organize data in rows and columns, simplifying data access and manipulation.

True

False

Question 90 / 1

pointDatabases based on the network model include IBM DB2, Oracle, Sybase, Microsoft SQL Server, Microsoft Access, and MySQL.

True

False

Question 100 / 1

pointOne of the primary disadvantages of a relational database is that it does not allow tables to be linked.

True

False

Question 110 / 1

pointValuable data is accurate, complete, economical, flexible, reliable, relevant, simple, timely, verifiable, accessible, and secure.

True

False

Question 120 / 1

pointData anomalies often result in incorrect information, causing database users to be misinformed about actual conditions.

True

False

Question 130 / 1

pointA database installed on a personal computer is typically meant for a single user.

True

False

Question 140 / 1

pointLarge mainframe computer systems can do without multiuser DBMSs.

True

Page 3: dsci 320

False

Question 150 / 1

pointAll DBMSs share some common functions, such as providing a user view, physically storing and retrieving data in a database, allowing for database modification, manipulating data, and generating reports.

True

False

Question 160 / 1

pointA DDL allows the database's creator to describe the data and relationships that are to be contained in the schema.

True

False

Question 170 / 1

pointA data dictionary should not include a description of data flows, the way records are organized, and the data-processing requirements.

True

False

Question 180 / 1

pointSQL statements can be embedded into many programming languages, such as the widely used C++ and COBOL languages.

True

False

Question 190 / 1

pointA DBMS can produce a wide variety of documents, reports, and other outputs that can help organizations achieve their goals.

True

False

Question 200 / 1

pointDatabase systems require a skilled project manager.

True

False

Question 210 / 1

point

Page 4: dsci 320

A network administrator is expected to have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.

True

False

Question 220 / 1

pointData warehouses allow managers to drill down to get more detail or roll up to take detailed data and generate aggregate or summary reports.

True

False

Question 230 / 1

pointA data model stores historical data that has been extracted from operational systems and external data sources.

True

False

Question 240 / 1

pointData marts bring the data warehouse concept (online analysis of sales, inventory, and other vital business data that has been gathered from transaction processing systems) to small and medium-sized businesses and to departments within larger companies.

True

False

Question 250 / 1

pointBecause data marts typically contain tens of gigabytes of data, as opposed to the hundreds of gigabytes in data warehouses, they can be deployed on less powerful hardware with smaller secondary storage devices, delivering significant savings to an organization.

True

False

Question 260 / 1

pointData marts are most useful for large groups who want to access general data.

True

False

Question 270 / 1

pointA data warehouse contains detailed information that can be used by an entire company.

True

False

Page 5: dsci 320

Question 280 / 1

pointDistributed databases give corporations and other organizations more flexibility in how databases are organized and used.

True

False

Question 290 / 1

pointBecause distributed databases rely on telecommunications lines to transport data, access to data can be slow.

True

False

Question 300 / 1

pointSpatial data technology is used by ICANN to store data from satellites and Earth stations.

True

False

Question 310 / 1

pointA ____ consists of a group of programs that manipulate the database and provide an interface between the database and its users and other application programs.

flat file

database management system

front-end application

data dictionary

Question 320 / 1

pointA ____ is a skilled and trained IS professional who directs all activities related to an organization's database, including providing security from intruders.

network administrator

software engineer

database administrator

system administrator

Question 330 / 1

pointA byte is typically ____ bits.

2

4

6

Page 6: dsci 320

8

Question 340 / 1

pointA ____ is typically a name, number, or combination of characters that describes an aspect of a business object.

field

character

record

file

Question 350 / 1

pointA collection of related data fields is a(n) ____.

record

database

entity

character

Question 360 / 1

pointA collection of related records is a(n) ____.

entity

attribute

file

schema

Question 370 / 1

pointA(n) ____ is a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained.

data model

entity

relational model

attribute

Question 380 / 1

pointA(n) ____ is a field or set of fields in a record that identifies the record.

file

attribute

record

key

Page 7: dsci 320

Question 390 / 1

pointThe ____ approach to data management is an approach whereby separate data files are created and stored for each application program.

traditional

systems

object-oriented

database

Question 400 / 1

pointThe ____ approach to data management is an approach whereby a Test of related data is shared by multiple application programs.

traditional

systems

object oriented

database

Question 410 / 1

point____ is a way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from elemental data, and some data attributes are repeated in more than one data entity to improve database performance.

Data modeling

Planned data redundancy

Concurrency control

Data mining

Question 420 / 1

point____ diagrams use basic graphical symbols to show the organization of and relationships between data.

Entity relationship

SQL

System

Domain

Question 430 / 1

pointThe ____ is a database model that describes data in which all data elements are placed in two-dimensional tables, called relations.

domain model

Page 8: dsci 320

query model

entity model

relational model

Question 440 / 1

point____ involves the manipulation of data to eliminate rows according to certain criteria.

Data mining

Selecting

Projecting

Joining

Question 450 / 1

point____ involves eliminating columns in a table.

Joining

Selecting

Projecting

Data mining

Question 460 / 1

point____ involves combining two or more tables.

Data mining

Selecting

Projecting

Joining

Question 470 / 1

pointA(n) ____ is a simple database program whose records have no relationship to one another.

flat file

data dictionary

data mart

attribute

Question 480 / 1

pointBecause the DBMS is responsible for access to a database, one of the first steps in installing and using a large database involves telling the DBMS the logical and physical structure of the data and relationships among the data in the database for each user. This description is called a(n) ____.

record

Page 9: dsci 320

relation

schema

data model

Question 490 / 1

pointA(n) ____ is a collection of instructions and commands used to define and describe data and relationships in a specific database.

machine language

procedural language

assembly language

data definition language

Question 500 / 1

pointA(n) ____ is a detailed description of all data used in the database.

data mart

data dictionary

attribute

data warehouse

Question 510 / 1

point____ is a method of dealing with a situation in which two or more people need to access the same record in a database at the same time.

Data modeling

Concurrency control

Predictive analysis

Query by Example

Question 520 / 1

point____ is a visual approach to developing database queries or requests.

Query-by-Example

Enterprise data modeling

Data mining

Concurrency control

Question 530 / 1

pointThe ____ is responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization.

Page 10: dsci 320

systems administrator

network administrator

data administrator

project manager

Question 540 / 1

pointA ____ is one that directly interacts with people or users.

database application

front-end application

proprietary application

back-end application

Question 550 / 1

pointA ____ interacts with other programs or applications; it only indirectly interacts with people or users.

database application

front-end application

proprietary application

back-end application

Question 560 / 1

pointA ____ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.

data warehouse

data mart

relation

data dictionary

Question 570 / 1

pointA(n) ____ is a subset of a data warehouse.

data model

data mart

object

schema

Question 580 / 1

point____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.

Page 11: dsci 320

Spatial technology

Query by example

Data mining

OLAP

Question 590 / 1

point____ is a form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events, such as future product sales or the probability that a customer will default on a loan.

Query by example

OLAP

Data modeling

Predictive analysis

Question 600 / 1

pointRetailers use ____ to upgrade occasional customers into frequent purchasers by predicting what products they will buy if offered an appropriate incentive.

databases

predictive analysis

bots

systems analysis

Question 610 / 1

point____ involves gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive effect on business strategy, tactics, or operations.

Data synchronization

Business intelligence

CRM

Paging

Question 620 / 1

point____ is one aspect of business intelligence and is limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations.

Competitive intelligence

Data synchronization

Counterintelligence

Paging

Question 63 0 / 1

Page 12: dsci 320

pointThe term ____ describes the steps an organization takes to protect information sought by "hostile" intelligence gatherers.

predictive analysis

data synchronization

data cleanup

counterintelligence

Question 640 / 1

pointA ____ holds a duplicate set of frequently used data.

data mart

relational database

replicated database

procedural database

Question 650 / 1

point____ is used to make sure that replicated databases are accurate, up to date, and consistent with each other.

Business intelligence

Data synchronization

OLAP

Spatial technology

Question 660 / 1

point____ allows users to explore data from a number of perspectives.

SQL

Data mining

OLAP

Predictive analysis

Question 670 / 1

pointAn object-oriented database uses a(n) ____ to provide a user interface and connections to other programs.

object-oriented database management system

Java

Visual Basic

object-relational database management system

Question 68 0 / 1 point

Page 13: dsci 320

A(n) ____ provides a complete set of relational database capabilities plus the ability for third parties to add new data types and operations to the database.

object-oriented database management system

Java

Visual Basic

object-relational database management system

Question 69 0 / 1 pointThe ____ is a design standard created by the Object Database Management Group for developing object-oriented database systems.

Database Standard

Object Data Standard

Programming Standard

Object-Oriented Standard

Question 700 / 1

point____ involves the use of a database to store and access data according to the locations it describes and to permit spatial queries and analysis.

Spatial data technology

SQL

Predictive analysis

Data mining

CHAPTER 6

Question 1 1 / 1 pointTelecommunications devices relay signals between computer systems and transmission media.

True

FalseQuestion 2

0 / 1 point

Voice and phone communications are examples of asynchronous communications.

True

FalseQuestion 3

0 / 1 point

Narrowband communications can exchange data very quickly.True

Page 14: dsci 320

FalseQuestion 4

0 / 1 point

A broadband communications system supports a very low rate of data exchange.

True

FalseQuestion 5

0 / 1 point

Twisted-pair wire offers cleaner and crisper data transmission (less noise) than coaxial cable.

True

FalseQuestion 6

0 / 1 point

Radio transmission operates in the 15 KHz–30 MHz frequency range.True

FalseQuestion 7

0 / 1 point

A potential issue with broadband over power lines is that transmitting data over unshielded power lines can interfere with both ham radio broadcasts and police and fire radios.

True

FalseQuestion 8

0 / 1 point

Infrared transmission requires line-of-sight transmission and short distances - such as a few yards.

True

FalseQuestion 9

0 / 1 point

Infrared transmission allows handheld computers to transmit data and information to larger computers within the same room and to connect a display screen, a printer, and a mouse to a computer.

True

FalseQuestion 10

0 / 1 point

Microwave signals can carry thousands of channels at the same time.

Page 15: dsci 320

True

FalseQuestion 11

0 / 1 point

A communications satellite can operate in the microwave frequency range.True

FalseQuestion 12

0 / 1 point

A WAN might be privately owned or rented and includes public networks.True

FalseQuestion 13

0 / 1 point

Many countries, including those in the European Union, have strict laws limiting the use of telecommunications and databases, making normal business transactions such as payroll costly, slow, or even impossible.

True

FalseQuestion 14

0 / 1 point

WANs usually consist of computer equipment owned by the user, together with data communications equipment and telecommunications links provided by various carriers and service providers.

True

FalseQuestion 15

0 / 1 point

A cable modem can deliver network and Internet access at up to 10Mbps.True

FalseQuestion 16

0 / 1 point

MySpace, the popular social networking Web site that offers an interactive, user submitted network of friends, personal profiles, blogs, photos, music, and videos internationally, was one of the first very busy Web sites to adopt the use of Windows Server 2008.

True

FalseQuestion 17

0 / 1 point

Page 16: dsci 320

With network management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses.

True

FalseQuestion 18

0 / 1 point

Encryption of data is one approach taken to protect the security of communications over both wired and wireless networks.

True

FalseQuestion 19

0 / 1 point

Most home and small business DSL users are connected to an asymmetric DSL (ADSL) line designed to provide a connection speed from the Internet to the user (download speed) that is three to four times faster than the connection from the user back to the Internet.

True

FalseQuestion 20

0 / 1 point

SDSL does not require an additional phone line and yet provides "always-on" Internet access.

True

FalseQuestion 21

0 / 1 point

Cable modems provide a dedicated connection from each user to the cable company's local office, so the performance does not decrease as new users are added.

True

FalseQuestion 22

0 / 1 point

ADSL does not allow you to use the phone at the same time.True

FalseQuestion 23

0 / 1 point

Page 17: dsci 320

A network center is a physical location where an organization handles customer and other telephone calls, usually with some amount of computer automation.

True

FalseQuestion 24

0 / 1 point

Electronic document distribution lets you send and receive documents in a digital form without printing them.

True

FalseQuestion 25

0 / 1 point

Videoconferencing enables people to hold a conference by combining voice, video, and audio transmission.

True

FalseQuestion 26

0 / 1 point

Videoconferencing reduces travel expenses and time, and increases managerial effectiveness through faster response to problems, access to more people, and less duplication of effort by geographically dispersed sites.

True

FalseQuestion 27

0 / 1 point

Public network services give personal computer users access to vast databases, the Internet, and other services, usually for an initial fee plus usage fees.

True

FalseQuestion 28

0 / 1 point

Wire transfers are cleared immediately and cannot be canceled.True

FalseQuestion 29

0 / 1 point

A shared workspace is a common work area where authorized project members and colleagues can share documents, issues, models, schedules, spreadsheets, photos, and all forms of information to keep each other current on the status of projects or topics of common interest.

True

Page 18: dsci 320

FalseQuestion 30

0 / 1 point

Distance learning can extend the classroom through the use of telecommunications.True

FalseQuestion 31

0 / 1 point

A ____ is any material substance that carries an electronic signal to support communications between a sending and receiving device.

slingbox

telecommunications medium

podcast

gatewayQuestion 32 0 / 1 point

The ____ is a specialized agency of the United Nations with headquarters in Geneva, Switzerland.

Institute of Electrical and Electronics Engineers

Near Field Communication

International Telecommunication Union

Infrared Transmission AgencyQuestion 33 0 / 1 point

____ communications occurs when the receiver gets the message instantaneously, when it is sent.

Asynchronous

Sequential

Synchronous

IndirectQuestion 34 0 / 1 point

____ communications occur when the receiver gets the message after some delay - sometimes hours or days after the message is sent.

Synchronous

Indirect

Sequential

Asynchronous

Question 35 0 / 1 point

Page 19: dsci 320

The term telecommunications ____ refers to the rate at which data is exchanged.channel bandwidth

channel router

channel access

channel gatewayQuestion 36 0 / 1 point

10 Gigabit Ethernet is a standard for transmitting data in full-duplex mode at the speed of 10 billion bits per second for limited distances over category 5 or 6 ____.

broadband over power lines

fiber-optic cable

coaxial cable

twisted-pair wireQuestion 37 0 / 1 point

An advantage of ____ is that it can provide Internet service to rural areas where cable and phone service may be nonexistent.

broadband over power lines

fiber-optic cable

coaxial cable

twisted-pair wireQuestion 38 0 / 1 point

____ transmission is a wireless communications technology that operates at a frequency of 300 GHz and above.

Infrared

Analog

Multiplexer

RadioQuestion 39 0 / 1 point

____ has the potential to replace Bluetooth's 2 Mbps transmission speed with 400 Mbps rates for wirelessly connecting printers and other devices to desktop computers or enabling completely wireless home multimedia networks.

Zigbee

Ultra wideband

Infrared transmission

Page 20: dsci 320

Near Field Communication

Question 40 0 / 1 point____ is a form of wireless communications frequently used in security systems and heating and cooling control systems.

Zigbee

Ultra wideband

Infrared transmission

Near Field Communication

Question 41 0 / 1 pointA ____ consists of a transmitter with an antenna.

frame relay

wireless access point

T-carrier system

routerQuestion 42 0 / 1 point

____ are transmitted by line-of-sight devices, so that the line of sight between the transmitter and receiver must be unobstructed.

Wireless meshes

Bluetooth signals

Ultra widebands

Terrestrial microwaves

Question 43 0 / 1 pointA ____ orbits the Earth directly over the equator, approximately 22,000 miles above the Earth so that it appears stationary.

geostationary satellite

very small aperture terminal

small mobile satellite station

low earth orbit satelliteQuestion 44 0 / 1 point

A ____ system employs many satellites, each in a circular orbit at an altitude of less than 1,000 miles.

geostationary satellite

very small aperture terminal

small mobile satellite

Page 21: dsci 320

low earth orbit satelliteQuestion 45 0 / 1 point

A ____ is a two-way satellite ground station with a dish antenna smaller than 3 meters in diameter.

geostationary satellite

very small aperture terminal

radio transmission system

low earth orbit satelliteQuestion 46 0 / 1 point

____ is a way to route communications among network nodes (computers or other devices) by allowing for continuous connections and reconfiguration around blocked paths by "hopping" from node to node until a connection can be established.

Instant messaging

ActiveX

Wireless mesh

Content StreamingQuestion 47 0 / 1 point

A(n) ____ is a variable signal that is continuous in both time and amplitude so that any small fluctuations in the signal are meaningful.

digital signal

frame relay

analog signal

microwaveQuestion 48 0 / 1 point

A(n) ____ represents bits.digital signal

analog signal

microwave

frame relayQuestion 49 0 / 1 point

A(n) ____ is a wireless network that connects information technology devices within a range of 33 feet or so.

extranet

intranet

virtual private network

Page 22: dsci 320

personal area networkQuestion 50 0 / 1 point

A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a(n) ____.

local area network

wide area network

ISP

URLQuestion 51 0 / 1 point

A(n) ____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or city.

URL

metropolitan area network

ISP

local area networkQuestion 52 0 / 1 point

A(n) ____ is a telecommunications network that connects large geographic regions.

ISP

local area network

URL

wide area networkQuestion 53 0 / 1 point

With ____, all processing occurs in a single location or facility.centralized processing

direct processing

sequential processing

decentralized processing

Question 54 0 / 1 pointWith ____, processing devices are placed at various remote locations.

centralized processing

decentralized processing

sequential processing

direct processingQuestion 55 0 / 1 point

Page 23: dsci 320

With ____, computers are placed at remote locations but connected to each other via telecommunications devices.

sequential processing

decentralized processing

distributed processing

centralized processingQuestion 56 0 / 1 point

One benefit of ____ is that managers can allocate data to the locations that can process it most efficiently.

sequential processing

decentralized processing

distributed processing

centralized processingQuestion 57 0 / 1 point

____ can dial telephone numbers, originate message sending, and answer incoming calls and messages.

Modems

Routers

Frame relays

GatewaysQuestion 58 0 / 1 point

A ____ is a telecommunications hardware device that converts communications signals so they can be transmitted over the communication media.

router

multiplexer

bridge

modemQuestion 59 0 / 1 point

A ____ is a device that encodes data from two or more data sources onto a single communications channel, thus reducing the number of communications channels needed and therefore, lowering telecommunications costs.

modem

multiplexer

Page 24: dsci 320

satellite

switchQuestion 60 0 / 1 point

____ are special-purpose computers that manage communications to and from a computer system serving hundreds or even thousands of users.

Front-end processorsQuestion 61 0 / 1 point

A ____ is a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol.

bridge

switch

router

podcastQuestion 62

0 / 1 point

A ____ forwards data packets across two or more distinct networks toward their destinations through a process known as routing.

bridge

switch

router

gateway

Question 63

0 / 1 point

A ____ is a network device that serves as an entrance to another network.bridge

switch

router

gateway

Question 64

0 / 1 point

____ simplifies the process of updating files and programs on computers on the network - a manager can make changes through a communications server instead of having to visit each individual computer.

Frame relay

IEEE

Channel bandwidth

Network management

Page 25: dsci 320

softwareQuestion 65 0 / 1 point

____ is the process of converting an original message into a form that can only be understood by the intended receiver.

Content streaming

Demodulation

Encryption

Centralized processing

Question 66 0 / 1 pointA ____ is a variable value that is applied (using an algorithm) to a set of unencrypted text to produce encrypted text or to decrypt encrypted text.

router

key

switch

protocolQuestion 67

0 / 1 point

A(n) ____ is a telecommunications service that delivers high-speed Internet access to homes and small businesses over the existing phone lines of the local telephone network.

ISP

switch

DSL

SlingboxQuestion 68 0 / 1 point

With ____, users can send, receive, and store verbal messages for and from other people around the world.

content streaming

voice mail

channel bandwidth

slingboxQuestion 69 0 / 1 point

____ is a way to communicate data from one company to another and from one application to another in a standard format.

Electronic data interchange

Content streaming

Page 26: dsci 320

Mesh networking

Centralized processingQuestion 70 0 / 1 point

____ is a system of transferring money from one bank account directly to another without any paper money changing hands.

Demodulation

Modulation

Electronic funds transfer

Telecommunications

Question 1 1 / 1 pointThe ARPANET was both an experiment in reliable networking and a means to link DoD and military research contractors, including many universities doing military-funded research.

True

False

Question 2 0 / 1 pointIn 1989, TCP/IP became the protocol for ARPANET.

True

False

Question 3 1 / 1 pointThe set of conventions used to pass packets from one host to another is known as the wireless application protocol.

True

False

Question 4 0 / 1 pointThe ICANN has the authority to resolve domain-name disputes.

True

False

Question 5 0 / 1 pointThe Serial Line Internet Protocol is used to connect cell phones and other devices to the Internet.

True

False

Page 27: dsci 320

Question 6 0 / 1 pointThe World Wide Web was developed by Linus Torvalds at CERN, the European Organization for Nuclear Research in Geneva.

True

False

Question 7 0 / 1 pointThe Web is a menu-based system that uses the peer-to-peer network model.

True

False

Question 8 0 / 1 pointWeb plug-ins can help provide additional features to standard Web sites.

True

False

Question 9 0 / 1 pointHTML tags let the browser know how to format text as a heading, as a list, or as body text.

True

False

Question 10 0 / 1 pointXML has a predefined tag set.

True

False

Question 11 0 / 1 pointPHP code or instructions can be embedded directly into HTML code.

True

False

Question 12 0 / 1 pointPopular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, Microsoft Expression Web, and Nvu.

True

False

Question 13 0 / 1 pointThe .NET platform allows developers to use different programming languages to create and run programs, including those for the Web.

True

False

Page 28: dsci 320

Question 14 0 / 1 pointThe key to Web services is XML.

True

False

Question 15 0 / 1 pointSearch engines make money from companies that place advertisements with the search results.

True

False

Question 16 0 / 1 pointVideo content can be placed on the Internet using the same approach as a blog.

True

False

Question 17 0 / 1 pointPeople and corporations can use podcasts to listen to audio material, increase revenues, or advertise products and services.

True

False

Question 18 0 / 1 pointRSS is a collection of Web technologies that allow users to subscribe to Web content that is frequently updated.

True

False

Question 19 0 / 1 pointUsing voice-over-IP (VoIP) technology, network managers can route phone calls and fax transmissions over the same network they use for data.

True

False

Question 20 0 / 1 pointOne way to put TV programming on the Internet is to use the wireless application protocol.

True

False

Question 21 0 / 1 pointThe ____ is a communication standard that enables traffic to be routed from one network to another as needed.

SLIP Internet Protocol

Page 29: dsci 320

PPP HTTP

Question 22 0 / 1 pointThe ____ gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located.

WWW

ARPANET

URL intranet

Question 23 0 / 1 pointThe ____ is a widely used Transport-layer protocol that most Internet applications use with IP.

SLIP HTTP TCP PPP

Question 24 0 / 1 pointThe term ____ is used to describe one of the Internet's high-speed, long-distance communications links.

backbone

podcasting

applet .NET

Question 25 0 / 1 pointThe ____ is a communications protocol that transmits packets over telephone lines.

IP HTTP TCP Serial Line Internet Protocol

Question 26 0 / 1 pointA(n) ____ is any company that provides people and organizations with access to the Internet.

Internet Service Provider host

personal information manager

application service providerQuestion 27 0 / 1 point

Page 30: dsci 320

The ____ is a collection of tens of millions of server computers that work together as one in an Internet service using hyperlink technology to provide information to billions of users.

Web Services Description Language

Uniform Resource Locator Simple Object Access Protocol WWW

Question 28 0 / 1 pointA(n) ____ is an entry point or doorway to the Internet.

kernel

Web portal

applet bot

Question 29 0 / 1 point____ is the standard page description language for Web pages.

HTML

XML PHP Java

Question 30 0 / 1 pointA(n) ____ is software that has the functionality and complexity of traditional application software, but runs in a Web browser and does not require local installation.

podcast SLIP rich Internet application applet

Question 31 0 / 1 pointA(n) ____ is a small program embedded in Web pages.

intranet

extranet

packet applet

Question 32 0 / 1 point____ is an object-oriented programming language from Sun Microsystems based on the C++ programming language.

ActiveX VBScript Java

Page 31: dsci 320

PHPQuestion 33 0 / 1 point____ allows small programs to be embedded within an HTML document.

ActiveX VBScript Java PHP

Question 34 0 / 1 point____ is an open-source programming language.

ActiveX VBScript Java PHP

Question 35 0 / 1 point____ consist of standards and tools that streamline and simplify communication among Web sites, promising to revolutionize the way we develop and use the Web for business and personal purposes.

Web services VPNs

Web services description languages

Chat roomsQuestion 36 0 / 1 point____ is a specification that defines the XML format for messages.

UDDI SOAP WSDL PHP

Question 37 0 / 1 point____ provides a way for a Web service application to describe its interfaces in enough detail to allow a user to build a client application to talk to it.

Universal Discovery Description and Integration Web Services Description Language Simple Object Access Protocol PHP

Question 38 0 / 1 point____ is used to register Web service applications with an Internet directory so that potential users can easily find them and carry out transactions over the Web.

Universal Discovery Description and Integration Web Services Description Language Simple Object Access Protocol PHP

Question 39 0 / 1 point

Page 32: dsci 320

Business users that access e-mail from smartphones such as the BlackBerry take advantage of a technology called ____.

Java

Spatial technology

OLAP Push e-mail

Question 40 0 / 1 point____ is a protocol that describes a file transfer process between a host and a remote computer.

Telnet FTP Podcasting Instant messaging

Question 41 0 / 1 point____ is a technology that uses e-mail to provide a centralized news service.

Telnet FTP Usenet Instant messaging

Question 42 0 / 1 pointWith ____, network managers can route phone calls and fax transmissions over the same network they use for data.

VPN VoIP TCP/IP HTTP

Question 43 0 / 1 point____ is a method for transferring multimedia files, radio broadcasts, and other content over the Internet so that the data stream of voice and pictures plays more or less continuously, without a break, or with very few breaks.

Content streaming

Tunneling Podcasting Instant messaging

Question 44 0 / 1 point____ enables users to browse large files in real time.

Content streaming

Tunneling Podcasting Instant messaging

Page 33: dsci 320

Question 45 0 / 1 pointA ____ is a software tool that searches the Web for information, products, or prices.

packet bot

podcast

clientQuestion 46 0 / 1 pointA(n) ____ is a way to connect buyers and sellers.

intranet extranet LAN

Web auction

Question 47 0 / 1 pointA(n) ____ is an internal corporate network built using Internet and World Wide Web standards and technologies.

extranet

applet intranet bot

Question 48 0 / 1 pointA(n) ____ is a network that links selected resources of a company's intranet with its customers, suppliers, or other business partners.

extranet

applet intranet bot

Question 49 0 / 1 pointA(n) ____ is a secure connection between two points on the Internet.

virtual private network intranet extranet tunnel

Question 50 0 / 1 pointVPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called ____.TUNNELING

CHAPTER 8:

Page 34: dsci 320

B2C e-commerce is a useful tool for connecting business partners in a virtual supply chain to cut resupply times and reduce costs.

True

FalseQuestion 2

0 / 1 point

By using B2C e-commerce to sell directly to consumers, producers or providers of consumer products can eliminate the middlemen, or intermediaries, between them and the consumer.

True

FalseQuestion 3

0 / 1 point

G2B applications support the purchase of materials and services from private industry by government procurement offices, enable firms to bid on government contracts, and help businesses receive current government regulations related to their operations.

True

FalseQuestion 4

0 / 1 point

B2B applications are designed to improve communications among the various levels of government.

True

FalseQuestion 5

0 / 1 point

At the heart of any e-commerce system is the user's ability to search for and identify items for sale; select those items and negotiate prices, terms of payment, and delivery date; send an order to the vendor to purchase the items; pay for the product or service; obtain product delivery; and receive after-sales support.

True

FalseQuestion 6

0 / 1 point

B2C e-commerce systems must support negotiation between buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges.

True

FalseQuestion 7

0 / 1 point

Page 35: dsci 320

Message boards and chat rooms can be used to build a loyal community of people who are interested in and enthusiastic about a company and its products and services.

True

FalseQuestion 8

0 / 1 point

B2C commerce relies on the use of wireless devices, such as personal digital assistants, cell phones, and smartphones, to place orders and conduct business.

True

FalseQuestion 9

0 / 1 point

The Internet Corporation for Assigned Names and Numbers (ICANN) created a .mobi domain to help attract mobile users to the Web.

True

FalseQuestion 10

0 / 1 point

Copyright law protects authored works such as books, film, images, music, and software from unauthorized copying.

True

FalseQuestion 11

0 / 1 point

Patents can protect software as well as business processes, formulae, compounds, and inventions.True

FalseQuestion 12

0 / 1 point

The digital divide exists not only between more and less developed countries but within countries between economic classes, the educated and uneducated, and those who live in cities and those who live in rural areas.

True

FalseQuestion 13

0 / 1 point

Today many e-commerce sites use an electronic shopping cart to track the items selected for purchase, allowing shoppers to view what is in their cart, add new items to it, or remove items from it.

True

Page 36: dsci 320

FalseQuestion 14

0 / 1 point

Web services can combine software and services from different companies to provide an integrated way to communicate.

True

FalseQuestion 15

0 / 1 point

ICANN is responsible for guaranteeing that the people or organizations granted digital certificates are, in fact, who they claim to be.

True

FalseQuestion 16

0 / 1 point

The SSL communications protocol includes a handshake stage, which authenticates the server (and the client, if needed), determines the encryption and hashing algorithms to be used, and exchanges encryption keys.

True

FalseQuestion 17

0 / 1 point

Although SSL handles the encryption part of a secure e-commerce transaction, a digital certificate is necessary to provide server identification.

True

FalseQuestion 18

0 / 1 point

Credit cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords.

True

FalseQuestion 19

0 / 1 point

Credit cards are better protected from misuse than conventional debit cards because the credit-card information is encrypted.

True

FalseQuestion 20

0 / 1 point

Page 37: dsci 320

A smart card makes credit theft practically impossible because a key to unlock the encrypted information is required, and there is no external number that a thief can identify and no physical signature a thief can forge.

True

FalseQuestion 21

0 / 1 point

____ is the conducting of business activities electronically over computer networks such as the Internet, extranets, and corporate networks.

Split-case distribution

Electronic bill presentment

Electronic commerce

MultiprogrammingQuestion 22 0 / 1 point

____ e-commerce is a subset of e-commerce where all the participants are organizations.B2B

G2G

C2C

B2CQuestion 23

0 / 1 point

____ e-commerce is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries.

B2B

G2G

C2C

B2CQuestion 24

0 / 1 point

____ is a subset of e-commerce that involves consumers selling directly to other consumers.

B2B

G2G

C2C

B2CQuestion 25

0 / 1 point

Page 38: dsci 320

____ is highly popular among college students because they represent a large community of low-income people in the same geographical region who watch for values.

B2B

G2G

C2C

B2CQuestion 26

0 / 1 point

____ is the direct sale of products or services by businesses to consumers through electronic storefronts, which are typically designed around the familiar electronic catalog and shopping cart model.

Electronic retailing

Electronic bill presentment

Personalization

Source data automationQuestion 27 0 / 1 point

A(n) ____ is a single Web site that offers many products and services at one Internet location.

online exchange

cybermall

cyber outlet

public exchange

Question 28 0 / 1 pointAutomated ____ are typically based on industry best practices, which can streamline processes.

exchanges

markets

patents

workflowsQuestion 29 0 / 1 point

____ is the identification of specific markets to target them with advertising messages.

Explicit personalization

Source data automation

Market segmentation

Page 39: dsci 320

Implicit personalizationQuestion 30 0 / 1 point

Because ____ devices usually have a single user, they are ideal for accessing personal information and receiving targeted messages for a particular consumer.

G2G commerce

m-commerce

G2C

smart cardQuestion 31 0 / 1 point

____ includes works of the mind such as books, films, music, processes, and software, which are distinct somehow and are owned or created by a single entity.

Electronic bill presentment

Personalization

E-commerce

Intellectual propertyQuestion 32 0 / 1 point

The term ____ refers to the use of any of several technologies to enforce policies for controlling access to digital media such as movies, music, and software.

digital rights management

patent

intellectual property

copyrightQuestion 33 0 / 1 point

Information that has siginificant value for a firm and for which strong measures are taken to protect it are ____.

trade practices

online profiles

trade secrets

Web servicesQuestion 34 0 / 1 point

In ____ advertising, the advertiser pays when a user clicks its ad to visit its Web site.

banner

Page 40: dsci 320

e-mail

video

pay-per-clickQuestion 35 0 / 1 point

____ entails sending bogus messages purportedly from a legitimate institution to pry personal information from customers by convincing them to go to a "spoofed" Web site.

Click fraud

Pay-per-click

Phishing

HackingQuestion 36 0 / 1 point

The term ____ is used to describe the practice of Web advertisers recording online behavior for the purpose of producing targeted advertising.

explicit personalization

online profiling

disintermediation

implicit personalization

Question 37 0 / 1 pointA(n) ____ is a company that act as an intermediary between your Web site and online merchants who have the products and retail expertise.

e-commerce broker

research broker

cybermall broker

storefront brokerQuestion 38 0 / 1 point

____ techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest entry forms completed online.

Explicit personalization

Online profiling

Disintermediation

Implicit personalizationQuestion 39 0 / 1 point

____ techniques capture data from actual customer Web sessions — primarily based on which pages were viewed and which were not.

Explicit personalization

Page 41: dsci 320

Online profiling

Disintermediation

Implicit personalizationQuestion 40 0 / 1 point

A(n) ____ hardware platform complete with the appropriate software is a key e-commerce infrastructure ingredient.

Web server

XML

WML

WAPQuestion 41 0 / 1 point

____ software must support five core tasks: catalog management, product configuration, shopping cart facilities, e-commerce transaction processing, and Web traffic data analysis.

WML

WAP

E-commerce

HTTPQuestion 42 0 / 1 point

____ transactions do not include sales tax calculations if they involve items purchased for resale.

M-commerce

B2B

G2C

B2CQuestion 43 0 / 1 point

____ Web pages contain variable information and are built to respond to a specific Web site visitor 's request.

Dynamic

Cache friendly

Static

HTMLQuestion 44 0 / 1 point

____ software combines different product data formats into a standard format for uniform viewing, aggregating, and integrating catalog data.

Web service

Page 42: dsci 320

Product configuration

Catalog management

Web page construction

Question 45 0 / 1 point____ software tools were originally developed in the 1980s to assist B2B salespeople to match their company's products to customer needs.

Web service

Product configuration

Catalog management

Web page construction

Question 46 0 / 1 point____ are software modules supporting specific business processes that users can interact with over a network (such as the Internet) as necessary.

Web services

Workflows

Smart cards

Meta tagsQuestion 47 0 / 1 point

A(n) ____ is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or Web site.

certificate authority

intelligent agent

Secure Sockets Layer

digital certificateQuestion 48 0 / 1 point

A ____ is a trusted third-party organization or company that issues digital certificates.certificate authority

storefront broker

Secure Sockets Layer

digital content publisher

Question 49 0 / 1 point____ is a key underlying technology of m-commerce that is supported by an entire industry association of over 200 vendors of wireless devices, services, and tools.

SSL

Page 43: dsci 320

WAP

DRM

HTMLQuestion 50

0 / 1 point

The ____ communications protocol is used to secure sensitive data during e-commerce.

HTTP

FTP

Secure Sockets Layer

TCP/IP


Recommended