MIS Test 2

63 Questions | Attempts: 453
Share
Please wait...
Question 1 / 63
0 %
0/100
Score 0/100
1. The term "open source" means that the source code of the program is ________________.
Submit
Please wait...
About This Quiz
MIS Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Bits are grouped into 8-bit chunks called ___________.
Submit
3. A(n) ______________ contains the URL of the Web page to find when the user clicks it.
Submit
4. Server farms are used when the _______________.
Submit
5. A byte is a _____________.
Submit
6. Which of the following is true about virtual private networks?
Submit
7. SQL is a(n) ________________.
Submit
8. __________ is the process of converting a poorly structured table into two or more well-structured tables.
Submit
9. When you buy an operating system for your personal computer, you are actual buying a software ____________.
Submit
10. A client-server application that requires nothing more than a browser is called a _____________.
Submit
11. A _________ is a computing device that prevents unauthorized network access.
Submit
12. Which of the following terms refers to a collection of servers?
Submit
13. Which of the following is a program used to create, process, and administer a database?
Submit
14. ________________ communications are secure, even though they are transmitted over the internet.
Submit
15. Virtualization is the process where _______________.
Submit
16. Metadata are _____________.
Submit
17. DBMS products are broadly classified into _______________.
Submit
18. Each entity has a unique attribute called ______________.
Submit
19. Bits are used for computer data because they ________________.
Submit
20. Which of the following is a program that controls the computer's resources?
Submit
21. Which of the following is a developmental task of a database administrator?
Submit
22. Which of the following is a function of an ISP?
Submit
23. Which of the following is likely to be used by organizations with limited budgets?
Submit
24. To run a program or process data, the computer first transfers the program or data from disk to the  ____________.
Submit
25. Which of the following is an example of a closed source project?
Submit
26. In which of the following cases is a user using the internet, but not the web?
Submit
27. A(n) is a set of rules that two communicating devices follow
Submit
28. _______________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.
Submit
29. Which of the following is nonvolatile in nature?
Submit
30. A ________ is equivalent to 1,024 bytes.
Submit
31. Which of the following is true of N:M relationships?
Submit
32. The application layer of the TCP/IP protocol architecture ________________.
Submit
33. A _____________ is a collection of forms, reports, queries, and programs that process a database
Submit
34. Entities have ______ that describe the characteristics of the entity.
Submit
35. Which of the following statements is true about UTP cables?
Submit
36. A ___________ is a column or group of columns that identifies a unique row in a table.
Submit
37. A network of computers that appears to operate as an integrated whole is known as a(n) ___________.
Submit
38. The various computers and printers on a LAN are connected to a _______________, which is a special purpose computer that receives and transmits wired traffic on the LAN.
Submit
39. Which of the following is an example of vertical-market software?
Submit
40. A(n) __________ uses the internet or other internet to create the appearance of private, point to point connections.
Submit
41. Packet-filtering firewalls perform all of the following except ______________.
Submit
42. Which of the following is one of the functions of an application program?
Submit
43. Which of the following protocols guarantees a secure transmission?
Submit
44. Ronald runs both Windows 7 and Linux on his desktop computer. The process is called _________________/
Submit
45. ________________ are commands that the CPU can process that may be specific for each processor type.
Submit
46. The connection between the VPN client and the VPN server is called a(n) ___________________.
Submit
47. Which of the following statements is true of firmware?
Submit
48. The operating system employs _________ so that users can run multiple applications and files at the same time.
Submit
49. Every table in a normalized database has a ______________.
Submit
50. A(n) _____________ is a piece of a message that is handled by programs that implement IP.
Submit
51. The ____________ problem is unique in a multi-user database environment.
Submit
52. Which of the following is most likely to be the last-choice alternative when deciding to acquire an application software?
Submit
53. Development costs of an information system include _______________.
Submit
54. Minimum cardinalities are
Submit
55. The __________________ layer of the TCP/IP protocol architecture is said to provide reliable internet transport.
Submit
56. The hardware component that connects a printer's circuitry to the network is called a(n) _________________.
Submit
57. _____________ is the process of converting a data model into tables, relationships, and data contraits.
Submit
58. Which of the following is an example of cloud computing?
Submit
59. The IEEE 802.3 and 802.11 protocols _______________.
Submit
60. Which of the following is an example of a database product?
Submit
61. In a database system, a _____________ is the smallest piece of data.
Submit
62. Which of the following is true for the TCP/IP protocol architecture?
Submit
63. A hospital is using a software to analyze treatment regimen and recovery times. The software relates to the dosages, regularity and therapeutic procedures to the time taken by patients segmented across age- and illness-groups. This software is an example of a(n) ________________.
Submit
View My Results

Quiz Review Timeline (Updated): Jan 30, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 30, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 18, 2011
    Quiz Created by
    Asr591
Cancel
  • All
    All (63)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The term "open source" means that the source code of the...
Bits are grouped into 8-bit chunks called ___________.
A(n) ______________ contains the URL of the Web page to find when the...
Server farms are used when the _______________.
A byte is a _____________.
Which of the following is true about virtual private networks?
SQL is a(n) ________________.
__________ is the process of converting a poorly structured table into...
When you buy an operating system for your personal computer, you are...
A client-server application that requires nothing more than a browser...
A _________ is a computing device that prevents unauthorized network...
Which of the following terms refers to a collection of servers?
Which of the following is a program used to create, process, and...
________________ communications are secure, even though they are...
Virtualization is the process where _______________.
Metadata are _____________.
DBMS products are broadly classified into _______________.
Each entity has a unique attribute called ______________.
Bits are used for computer data because they ________________.
Which of the following is a program that controls the computer's...
Which of the following is a developmental task of a database...
Which of the following is a function of an ISP?
Which of the following is likely to be used by organizations with...
To run a program or process data, the computer first transfers the...
Which of the following is an example of a closed source project?
In which of the following cases is a user using the internet, but not...
A(n) is a set of rules that two communicating devices follow
_______________ are programs that run on a server-tier computer and...
Which of the following is nonvolatile in nature?
A ________ is equivalent to 1,024 bytes.
Which of the following is true of N:M relationships?
The application layer of the TCP/IP protocol architecture...
A _____________ is a collection of forms, reports, queries, and...
Entities have ______ that describe the characteristics of the entity.
Which of the following statements is true about UTP cables?
A ___________ is a column or group of columns that identifies a unique...
A network of computers that appears to operate as an integrated whole...
The various computers and printers on a LAN are connected to a...
Which of the following is an example of vertical-market software?
A(n) __________ uses the internet or other internet to create the...
Packet-filtering firewalls perform all of the following except...
Which of the following is one of the functions of an application...
Which of the following protocols guarantees a secure transmission?
Ronald runs both Windows 7 and Linux on his desktop computer. The...
________________ are commands that the CPU can process that may be...
The connection between the VPN client and the VPN server is called...
Which of the following statements is true of firmware?
The operating system employs _________ so that users can run multiple...
Every table in a normalized database has a ______________.
A(n) _____________ is a piece of a message that is handled by programs...
The ____________ problem is unique in a multi-user database...
Which of the following is most likely to be the last-choice...
Development costs of an information system include _______________.
Minimum cardinalities are
The __________________ layer of the TCP/IP protocol architecture is...
The hardware component that connects a printer's circuitry to the...
_____________ is the process of converting a data model into tables,...
Which of the following is an example of cloud computing?
The IEEE 802.3 and 802.11 protocols _______________.
Which of the following is an example of a database product?
In a database system, a _____________ is the smallest piece of data.
Which of the following is true for the TCP/IP protocol architecture?
A hospital is using a software to analyze treatment regimen and...
Alert!

Advertisement