ISYS 209 EXAM 3 COMPLETE (162) CURRENT
TESTING QUESTIONS AND DETAILED
CORRECT ANSWERS|GUARANTEED PASS.
ISYS 209
Prepare for the ISYS 209 Exam 3 with this concise study resource
covering information systems fundamentals, data management
concepts, and exam-style questions. Suitable for students
studying information systems and business technology courses
If you are renting a home while going to college and would
like to connect to the Internet, you will need to contact
a(n)______________ such as EarthLink, NetZero, or AT&T to
connect. ✓ ✓ ...... ANSWER ....... ISP
Facebook and Twitter are both companies that enable users
to join up with a larger community. The formal name for this
type of organization is called __________________. ✓ ✓ ......
ANSWER ....... social networking
Shopping _______ use intelligent agent software to help
people filter and discover information about potential
products. ✓ ✓ ...... ANSWER ....... bots
, Page 2 of 34
One promising prediction for the future is that _____ will
bring digital information, in all forms, together into a single,
meaningful, experience. ✓ ✓ ...... ANSWER ....... Web
3.0
A common wireless networking standard, _______ is
generally used for PANs. ✓ ✓ ...... ANSWER .......
Bluetooth
What type of systems provide technology for tracking the
movement of goods throughout the supply chain? ✓ ✓ ......
ANSWER ....... RFID
If you want your cell phone to transmit up to 100
megabits/second downloads, you would need to upgrade to
a(n) _____________ network. ✓ ✓ ...... ANSWER ....... 4G
802.15 is the popular networking standard also known as
________________. ✓ ✓ ...... ANSWER ....... Bluetooth
, Page 3 of 34
If you are purchasing a router that can provide wireless Wi-Fi
at up to 11 Mbsp (but not over), you would need to purchase
an __________ router. ✓ ✓ ...... ANSWER ....... 802.11b
Because it is difficult to lay cable or set up numerous Wi-Fi
networks in rural areas of the U.S., ______ becomes a more
viable option as it has a range of approximately 30 miles. ✓
✓ ...... ANSWER ....... WiMax
_____ can be destructive to a company when at risk for
people or programs deliberately moving through ads, thus
driving up advertising costs for a company. ✓ ✓ ......
ANSWER ....... Click fraud
What is Pharming? ✓ ✓ ...... ANSWER ....... Users are
redirected to a phony web page even when the correct URL
is typed in.
Target was attacked by hackers who installed ___________ in
the company's security and payments system. ✓ ✓ ......
ANSWER ....... malware
, Page 4 of 34
Security in an information systems context refers to
___________________________, which are used to prevent
unauthorized access or theft. ✓ ✓ ...... ANSWER .......
policies, procedures, and technical measures
One wireless security concern is called _________, where
eavesdroppers drive by locations trying to intercept wireless
network traffic. ✓ ✓ ...... ANSWER ....... war driving
Because so many Web pages use databases, _____ is a
major malware threat since poorly coded Web application
software is vulnerable. ✓ ✓ ...... ANSWER ....... an SQL
injection attack
The _____ mandates that financial services firms ensure
security and confidentiality of customer data. ✓ ✓ ......
ANSWER ....... Gramm-Leach-Bliley Act
What outlines medical security and privacy rules and
procedures for simplifying the administration of health care
billing and automating the transfer of health care data? ✓ ✓
...... ANSWER ....... HIPAA Act