Answers with completed solutions
A Trojan horse:
-installs spyware on users' computers.
-is malware named for a breed of fast-moving Near-Eastern horses.
-is a type of sniffer used to infiltrate corporate networks.
-is software that appears to be benign but does something other than expected.
-is a virus that replicates quickly. - ANSWER Is a software that appears to be benign but
does something other than expected
VPN - ANSWER an encrypted private network configured within a public network
A characteristic or quality describing an entity is called a - ANSWER Field
A client computer networked to a server computer, with processing split between the
two types of machines, is called a(n) ________ architecture.
-on-demand
-grid
-service-oriented
-multitiered client/server
-two-tiered client/server - ANSWER Two-Tiered client/server
A data ________ stores current and historical data of potential interest to decision
makers throughout the company.
-mine
-center
-archive
-mart
-warehouse - ANSWER Warehouse
A data mart usually can be constructed more rapidly and at lower cost than a data
warehouse because:
-it typically focuses on a single subject area or line of business.
-all of the information belongs to a single company.
-it is open-source.
-it uses a web interface.
,MIS Exam 3 2022 Questions and
Answers with completed solutions
-all the information is historical. - ANSWER It typically focuses on a single area or line of
business
A digital certificate system:
-uses digital signatures to validate a user's identity.
-uses tokens to validate a user's identity.
-is used primarily by individuals for personal correspondence.
-protects a user's identity by substituting a certificate in place of identifiable traits.
-uses third party CAs to validate a user's identity. - ANSWER Uses third party CA's to
validate a user's identity
A field identified in a record as holding the unique identifier for that record is called the:
-key field.
-primary key.
-primary field.
-identifying field.
-foreign key. - ANSWER Key Field
A field identified in a table as holding the unique identifier of the table's records is called
the:
-primary field.
-primary key.
-foreign key.
-identifying field.
-key field. - ANSWER Primary Key
A firewall allows the organization to:
create an enterprise system on the Internet.
, MIS Exam 3 2022 Questions and
Answers with completed solutions
-check the accuracy of all transactions between its network and the Internet.
-check the content of all incoming and outgoing email messages.
-create access rules for a network.
-enforce a security policy on data exchanged between its network and the Internet. -
ANSWER Enforce a security policy on data exchanged between its network and the
internet
A network that covers entire geographical regions is most commonly referred to as a(n):
-intranet.
-local area network.
-peer-to-peer network.
-wide area network.
-metropolitan area network. - ANSWER Local area network
A network that spans a college or corporate facility is called a:
-CAN.
-WAN.
-WSN.
-LAN.
-MAN. - ANSWER WAN
A one-to-many relationship between two entities is symbolized in a diagram by a line
that ends:
-with a crow's foot.
-with a crow's foot preceded by a short mark.
-in one short mark.