MIS Test 2

63 Questions | Attempts: 453
Please wait...
Question 1 / 64
🏆 Rank #--
Score 0/100

1. The term "open source" means that the source code of the program is ________________.

Submit
Please wait...
About This Quiz
MIS Quizzes & Trivia

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Bits are grouped into 8-bit chunks called ___________.

Submit

3. A(n) ______________ contains the URL of the Web page to find when the user clicks it.

Submit

4. Server farms are used when the _______________.

Submit

5. A byte is a _____________.

Submit

6. Which of the following is true about virtual private networks?

Submit

7. SQL is a(n) ________________.

Submit

8. __________ is the process of converting a poorly structured table into two or more well-structured tables.

Submit

9. When you buy an operating system for your personal computer, you are actual buying a software ____________.

Submit

10. A client-server application that requires nothing more than a browser is called a _____________.

Submit

11. A _________ is a computing device that prevents unauthorized network access.

Submit

12. Which of the following terms refers to a collection of servers?

Submit

13. Which of the following is a program used to create, process, and administer a database?

Submit

14. ________________ communications are secure, even though they are transmitted over the internet.

Submit

15. Virtualization is the process where _______________.

Submit

16. Metadata are _____________.

Submit

17. DBMS products are broadly classified into _______________.

Submit

18. Each entity has a unique attribute called ______________.

Submit

19. Bits are used for computer data because they ________________.

Submit

20. Which of the following is a program that controls the computer's resources?

Submit

21. Which of the following is a developmental task of a database administrator?

Submit

22. Which of the following is a function of an ISP?

Submit

23. Which of the following is likely to be used by organizations with limited budgets?

Submit

24. To run a program or process data, the computer first transfers the program or data from disk to the  ____________.

Submit

25. Which of the following is an example of a closed source project?

Submit

26. In which of the following cases is a user using the internet, but not the web?

Submit

27. A(n) is a set of rules that two communicating devices follow

Submit

28. _______________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.

Submit

29. Which of the following is nonvolatile in nature?

Submit

30. A ________ is equivalent to 1,024 bytes.

Submit

31. Which of the following is true of N:M relationships?

Submit

32. The application layer of the TCP/IP protocol architecture ________________.

Submit

33. A _____________ is a collection of forms, reports, queries, and programs that process a database

Submit

34. Entities have ______ that describe the characteristics of the entity.

Submit

35. Which of the following statements is true about UTP cables?

Submit

36. A ___________ is a column or group of columns that identifies a unique row in a table.

Submit

37. A network of computers that appears to operate as an integrated whole is known as a(n) ___________.

Submit

38. The various computers and printers on a LAN are connected to a _______________, which is a special purpose computer that receives and transmits wired traffic on the LAN.

Submit

39. Which of the following is an example of vertical-market software?

Submit

40. A(n) __________ uses the internet or other internet to create the appearance of private, point to point connections.

Submit

41. Packet-filtering firewalls perform all of the following except ______________.

Submit

42. Which of the following is one of the functions of an application program?

Submit

43. Which of the following protocols guarantees a secure transmission?

Submit

44. Ronald runs both Windows 7 and Linux on his desktop computer. The process is called _________________/

Submit

45. ________________ are commands that the CPU can process that may be specific for each processor type.

Submit

46. The connection between the VPN client and the VPN server is called a(n) ___________________.

Submit

47. Which of the following statements is true of firmware?

Submit

48. The operating system employs _________ so that users can run multiple applications and files at the same time.

Submit

49. Every table in a normalized database has a ______________.

Submit

50. A(n) _____________ is a piece of a message that is handled by programs that implement IP.

Submit

51. The ____________ problem is unique in a multi-user database environment.

Submit

52. Which of the following is most likely to be the last-choice alternative when deciding to acquire an application software?

Submit

53. Development costs of an information system include _______________.

Submit

54. Minimum cardinalities are

Submit

55. The __________________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport.

Submit

56. The hardware component that connects a printer's circuitry to the network is called a(n) _________________.

Submit

57. _____________ is the process of converting a data model into tables, relationships, and data contraits.

Submit

58. Which of the following is an example of cloud computing?

Submit

59. The IEEE 802.3 and 802.11 protocols _______________.

Submit

60. Which of the following is an example of a database product?

Submit

61. In a database system, a _____________ is the smallest piece of data.

Submit

62. Which of the following is true for the TCP/IP protocol architecture?

Submit

63. A hospital is using a software to analyze treatment regimen and recovery times. The software relates to the dosages, regularity and therapeutic procedures to the time taken by patients segmented across age- and illness-groups. This software is an example of a(n) ________________.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (63)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The term "open source" means that the source code of the...
Bits are grouped into 8-bit chunks called ___________.
A(n) ______________ contains the URL of the Web page to find when the...
Server farms are used when the _______________.
A byte is a _____________.
Which of the following is true about virtual private networks?
SQL is a(n) ________________.
__________ is the process of converting a poorly structured table into...
When you buy an operating system for your personal computer, you are...
A client-server application that requires nothing more than a browser...
A _________ is a computing device that prevents unauthorized network...
Which of the following terms refers to a collection of servers?
Which of the following is a program used to create, process, and...
________________ communications are secure, even though they are...
Virtualization is the process where _______________.
Metadata are _____________.
DBMS products are broadly classified into _______________.
Each entity has a unique attribute called ______________.
Bits are used for computer data because they ________________.
Which of the following is a program that controls the computer's...
Which of the following is a developmental task of a database...
Which of the following is a function of an ISP?
Which of the following is likely to be used by organizations with...
To run a program or process data, the computer first transfers the...
Which of the following is an example of a closed source project?
In which of the following cases is a user using the internet, but not...
A(n) is a set of rules that two communicating devices follow
_______________ are programs that run on a server-tier computer and...
Which of the following is nonvolatile in nature?
A ________ is equivalent to 1,024 bytes.
Which of the following is true of N:M relationships?
The application layer of the TCP/IP protocol architecture...
A _____________ is a collection of forms, reports, queries, and...
Entities have ______ that describe the characteristics of the entity.
Which of the following statements is true about UTP cables?
A ___________ is a column or group of columns that identifies a unique...
A network of computers that appears to operate as an integrated whole...
The various computers and printers on a LAN are connected to a...
Which of the following is an example of vertical-market software?
A(n) __________ uses the internet or other internet to create the...
Packet-filtering firewalls perform all of the following except...
Which of the following is one of the functions of an application...
Which of the following protocols guarantees a secure transmission?
Ronald runs both Windows 7 and Linux on his desktop computer. The...
________________ are commands that the CPU can process that may be...
The connection between the VPN client and the VPN server is called...
Which of the following statements is true of firmware?
The operating system employs _________ so that users can run multiple...
Every table in a normalized database has a ______________.
A(n) _____________ is a piece of a message that is handled by programs...
The ____________ problem is unique in a multi-user database...
Which of the following is most likely to be the last-choice...
Development costs of an information system include _______________.
Minimum cardinalities are
The __________________ layer of the TCP/IP protocol architecture is...
The hardware component that connects a printer's circuitry to the...
_____________ is the process of converting a data model into tables,...
Which of the following is an example of cloud computing?
The IEEE 802.3 and 802.11 protocols _______________.
Which of the following is an example of a database product?
In a database system, a _____________ is the smallest piece of data.
Which of the following is true for the TCP/IP protocol architecture?
A hospital is using a software to analyze treatment regimen and...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!