DOC PREVIEW
MSU HB 337 - Exam 1

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1. Data extraction in a database relies on _, which is a query format providing instructions for building and modifying the structure of a database.A) SQLB) DBMSC) Primary KeyD) Foreign KeyA2. The principle _ refers to sights, sounds, and other stimuli that remind us of related products and ideas (eg. Rebecca Black’s “Friday”)A) EmotionB) StoriesC) PublicD) TriggerD3. Hason’s Shoe Repair is a cocktail bar in downtown Orlando. The only way to gain entrance is by calling a phone number and following the directions on a scratchy recording. Callers receive reservations through a call back that gives a password to enter the bar. They made themselves a secret yet highly popular on social media. This is an example of _ principle.A) TriggerB) SOcial currencyC) EmotionD) Practical valueB4. Bytes are made up of:A) TablesB) FieldsC) RecordsD) BitsD5. Encryption is the process of encoding messages or information in such a way that only authorized parties can understand it.A) TrueB) FalseA6. A crisis is a change -either sudden or evolving - that results in an urgent problem that management must address.A) TrueB) FalseA7. ____ is a targeted form of phishing in which fraudulent emails target specific individuals in an effort to gain access to confidential information. The attackers usually disguise themselves as a trustworthy friend or entity to trick a target into opening an attachment or click on a malicious link.A) PretxingB) BaitingC) Spear phishingD) TailgatingC8. Computer operation includes four partsL register, ALU, control unit, and data storage. __ is the one that carries out math and logic functionsA) RegisterB) ALUC) COntrol UnitD) Data storageA9. Object oriented database handles multimedia and graphic-based dataA) TrueB) FalseA10. As discussed in class, tables in a relationship database are linked bu:A) POublic key and foreign keyB) Primary Key and foreign keyC) Primary Key and private keyD) Public Key and private KeyB11. When facing a large volume of information, customers cnanot always process all the information. Such a process is calledA) Cognitive loadB) Choice overload effectC) Selective information processingD) Need for cognitionC12. A workstation is a ___A) ServerB) NetworkC) CPUD) Personal computerD13. _____ is needed for nodes to join a networkA) Network clientsB) Network operating systemC) Network serverD) Network interface cardD14. As discussed in class, ongoing IT expenditures such as maintenance and support expenses should not exceed _ of market value of your information systems/A) 1%B) 5%C) 10%D) 15%A15. There are two types of computer memory, __ is temporary whereas _ is permanent. A) RAM, ROMB) ROM, RAM16. Computer network is defined as a collection of computers and network hardware interconnected by communication channels that allow sharing of resources and information such as printers, PMS, and databases.A) TrueB) FalseA17. Electronic Data Processing has several advantages. WHich of the following is NOT an advantage of EDP?A) SpeedB) AccuracyC) RedundancyD) ControlC18. ____ uses a fake access point that is designed to look like a real hotspot. When users log into the network, they unknowingly expose their passwords and other sensitive information to hackers.A) Social engineeringB) SniffingC) SidejackingD) Evil twin attackD19. The most common type of database in the hospitality business isA) Hierarchical databaseB) Relational databaseC) Network databaseD) Object oriented databaseB20. Application software tools provide the platform for running system software A) TrueB) FalseB21. Data warehousing is an analysis of data for potential relationshipsA) TrueB) FalseB22. Analog signals consist of just two states: 0 and 1A) TrueB) FalseB23. ____ encryption requires one key, and ___ encryption requires a pair of keysA) Symmetric, AsymmetricB) Asymmetric; SymmetricA24. It is easier for a hacker to hack the network than to trick someone into giving them the password.A) TrueB) FalseB25. A MAN(metropolitan area network) is a group of computers and network devices connected together, usually within the same buildingA) TrueB) FalseB26. Based on what we discussed in class, which of the following passwords is the safest ?A) PaSsWOrd@1cB) dailysupercarrychainC) super123D) MONKEYB27. ____- is a glass or plastic fiber that carries light along its length. This kind of cable is the fastest and most expensive transmission medium in the world today.A) Twisted-pair cableB) Coaxial cableC) Fiber-opticD) Glass-opticC28. What kind of cable layout is this?A) Bus topologyB) Star topologyC) Ring topologyD) Mesh topologyB29. Inventing stories or scenarios to get people to complete an action which will provide some orall of the necessary details to extract data or breach a network.A) BaitingB) TailgatingC) PhishingD) PretextingD30. Which of the following is NOt one of the guidelines provided by NIST?A) Turn on multi-factor authentication wherever possibleB) Giving each important account a unique passwordC) Don't rely on passwords alone to protect your system.D) Change your password regularly31. DBMS is a type of system software that provides user user and database administration withthe ability to access and manipulate data.A) TrueB) FalseA32. Which of the following is NOT a component of computer hardware?A) Input/Output UnitsB) Central processing unitC) Operating systemD) Computer memoryC33. A node on a network can beA) A computerB) A serverC) A scannerD) All of the aboveD34. Bandwidth is the amount of data that can be transmitted in a fixed amount of time. It is expressed in __.A) Byte per secondB) Bits per secondC) Byte per setD) Bits per setB35. The network database model was the first attempt to organize data in a structure so as to reduce redundancy. With the network model, a parent can have multiple children, and children can only have one parent/ A) TrueB) FalseBPart 2:Lost the six stages of crisis management and use this framework to perform an analysis of a crisis. Please focus on only one of the


View Full Document

MSU HB 337 - Exam 1

Download Exam 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?