Q16. Records can be arranged in several ways on a storage
medium. The arrangement of records determines:
a. how individual records can be accessed.
b. how long it takes to access records.
c. how individual records can be accessed and how
long it takes to access them.
d. the storage media used for storage.
Q17. Which is not a benefit of having a unified view of
customers?
a. More accurate customer data to support
marketing, sales, support, and service initiatives.
b. Better responsiveness to ensure that customer
service representatives have up-to-date, reliable information on
the customers.
c. Faster transaction processing by organizing
the data in one location.
d. Better revenue management and more responsive
business decisions.
Q18. In the healthcare industry, data errors __________.
a. increase healthcare costs by billions of
dollars
b. have minimized healthcare costs
c. have no impact on patient care
d. have been eliminated by the use of data
warehousing
Q19. Which is not a characteristic of a data warehouse?
a. Data are organized by subject, such as
customer, vendor, or product.
b. Data are coded in a consistent manner.
c. Data are kept for many years to be used for
identifying trends, forecasting, and comparisons over time.
d. Most applications of data warehousing are in
real-time.
Q20. Companies implement __________ systems to retain and archive
their business records that are not needed for current operations
or decisions, but that must be accessible for legal or auditing
obligations.
a. electronic records management
b. database management
c. archive management
d. infrastructure management
Q21. What is significant about 4G networks is that they do not have
a __________, which both 2G and 3G networks do have.
a. packet-switched IP system
b. circuit-switched subsystem
c. WiMAX standard
d. GSM-based LTE subsystem
Q22. Virtual private networks (VPN) are private tunnels in the
Internet that are created by __________.
a. content indexing
b. usernames and passwords
c. biometrics
d. encryption
Q23. __________ is a general term that means fast transmission
speed.
a. Bandwidth
b. Protocol
c. TCP/IP
d. Broadband
Q24. __________ transmits voice and data in packets and has become
one of the most cost effective ways to communicate.
a. TCP
b. UDP
c. VoIP
d. UM
Q25. Which of the following is a dysfunction of the group
process?
a. Social pressures of conformity can lead to
groupthink.
b. A group may produce synergy during problem
solving.
c. Group members may have their egos embedded in
the decision, and so they may be committed to the solution.
d. Groups are better than individuals at
understanding problems.
Q26. __________ are networks that are capable of transmitting data
at very fast rates, but operate in a limited area, such as an
office building, campus, or home.
a. MANs
b. Hot spots
c. LANs
d. WANs
Q27. What is the most cost-effective approach to managing
fraud?
a. prevention
b. detection
c. prosecution
d. compliance
Q28. __________, such as AirSnort and WEPcrack, are readily
available tools that can be used to gain unauthorized access to
networks putting them at great risk.
a. Wireless packet analyzers
b. Password crackers
c. Firewall sniffers
d. Intrusion detectors
Q29. A(n) __________ is the probability of a threat exploiting a
vulnerability.
a. threat
b. risk
c. vulnerability
d. exploit
Q30. Crime can be divided into two categories depending on the
tactics used to carry out the crime. What are those two
categories?
a. personal and non-personal
b. felonies and misdemeanors
c. insider and outsider
d. violent and nonviolent
Q16. Records can be arranged in several ways on a storage medium. The arrangement of records determines:
Answer - option C - how individual records can be accessed and how long it takes to access them.
2 ways of access are there -
- Sequential Access - takes more time , need to traverse from first record till the required record
- Random access - takes less time , less overhead ,can directly access required file directly
Q17. Which is not a benefit of having a unified view of customers?
option-C. Faster transaction processing by organizing the data in one location.
Q18. In the healthcare industry, data errors
option-D have been eliminated by the use of data warehousing
Q19. Which is not a characteristic of a data warehouse?
option B - b. Data are coded in a consistent manner. this is wrong
Q16. Records can be arranged in several ways on a storage medium. The arrangement of records...
14) The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as A) access control list. B) deep packet inspection. C) intrusion filtering. D) packet filtering. 15) The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as A) deep packet inspection. B) stateful packet filtering. C) static...
Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....
check my answers for Networking I came up with these answers, can check my answers Question 1: General What data rate is needed to transmit an uncompressed 4" x 6" photograph every second with a resolution of 1200 dots per inch and 24 bits per dot (pixel)? 691,200 kb/s 28.8 kb/s 8.29 Mb/s 829 Mb/s Question 2: Layering "Layering" is commonly used in computer networks because (check all that apply): -It forces all network software to be written in āCā....
36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...
Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...
Homework. Answered Which is not true of the Transmission Control Protocol (TCP)? Multiple answers: You can select more than one option O A it supports full duplex communication o B it has graceful connection shutdown O Ń its connections are logical D it uses the message paradigm E it is an end-to-end protocol O F None of the above Answered Change your responses to resubmit Match the NIST Framework Category with the Task Premise Response Drag and drop to match...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...
Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...
Chapter 18: wireless networks TRUE OR FALSE T F 1. As the demand for broadband Internet access has grown, providers of wired local loop service have responded with increasing reliance on optical fiber and coaxial cable. T F 2. A BWA provider services one or more cells. T F 3. Wireless systems are more expensive than wired systems. T F 4. IEEE 802.16 and the associated WiMAX specification now deal with both fixed and mobile BWA. T F ...
Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...