Chapter 3Databa-WPS Office

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

Chapter 3Database system and big dataIntroduction:Database:an organized collection of dataA

database management system ( DBMS )is a group of programs that:1.Manipulate the


database2.Provides an interface between the database and its users and other
applicationprogramsData fundamentals:Without data and the ability to process it:oAn organization
could not successfully complete most business activitiesoData consist of raw factsData must be
organized in a meaningful way to transform it into usefulinformation.Hierarchy of data:A bit ( binary
digit ) represents a circuit that is either on or offA byte is made up of eight bitsoEach byte represents a
character.Field:a name, number, or combination of characters that describes an aspect of abusiness
object or activityRecord:a collection of related data fields ( taking all the results coming from the
field,like taking every result comes from last name every student and employee and anyonewith the last
name is in the records )File:a collection of related records ( a collection of all the records )Database:a
collection of integrated and related filesHierarchy of data:bits, characters, field, records, files, and
databases.Data Entities, attributes, and keys:Entity:a person, place, or thing for which data is
collected, stored, and maintained

Chapter 4 Networks and Cloud Computing

University: Vancouver Community College

Course: Information and Research Fundamentals (PREH 1110)

6 documents

Info

Name: Class: Date: Chapter 4 - Networks and Cloud ComputingTrue / False1. The United States has
high Internet penetration among its population constituting the majority of people online. a. True b.
FalseANSWER: False2. The Internet is the infrastructure on which the Web exists. a. True b.
FalseANSWER: True3. Sensors that can monitor and report on data about traffic and parking conditions
are part of a network of physical objects known as the Internet of Technology. a. True b. FalseANSWER:
False4. The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet
domain names. a. True b. FalseANSWER: False5. Cascading Style Sheets (CSS) use special Hypertext
Markup Language (HTML) tags to globally define font characteristics for a variety of page elements as
well as how those elements are laid out on a Web page. a. True b. FalseANSWER: True6. Like other
programs, Java software can run only on specific types of computers. a. True b. FalseANSWER: False7.
Organizations that are concerned about the security of their data should not use public cloud
computing. a. TrueCopyright Cengage Learning. Powered by Cognero. Page 1

Name: Class: Date: Chapter 4 - Networks and Cloud Computing b. FalseANSWER: True8. JavaScript
can be used to validate data entry in a Web form. a. True b. FalseANSWER: True9. Twitter is a
microblogging service. a. True b. FalseANSWER: True10. A podcast is a video broadcast over the
Internet. a. True b. FalseANSWER: False11. Video content can be placed on the Internet using the same
approach as a blog. a. True b. FalseANSWER: True12. There is no way a manufacturing firm would
implement an Internet of Things because the risk of hacking is far too high. a. True b. FalseANSWER:
False13. Businesses and organizations that manage a local area network (LAN) connect to the Internet
via a Web browser. a. True b. FalseANSWER: False14. The Internet is a hyperlink-based system that uses
a client/server model.Copyright Cengage Learning. Powered by Cognero. Page 2

Recommended for you

Document continues below

13

Chapter 6 Business Intelligence and Analytics

Chapter 6 Business Intelligence and Analytics

Information and Research Fundamentals

100% (4)

8.2.6 Configure Rogue Host Protection

8.2.6 Configure Rogue Host Protection

Applied Computer Security

100% (7)

12.2.4 Isolate and Containment Facts

12.2.4 Isolate and Containment Facts

Applied Computer Security


100% (1)

7.5.4 Certificate Types Facts

7.5.4 Certificate Types Facts

Applied Computer Security

100% (1)

Students also viewed

Bio 211 Sum 20 Online Syllabus

Cost Controls Term Project Assignment

Costcontrol Chapter 11

Chapter 10 Worksheet Comprehension Questions 5 6

2019 Final Question package

Culture and Major Theories

Related documents

Legal Case Perception Questionnaire

BS - Ass 2 - Assignment 2

Project scope statement sample

Kitchen renovation project sample

culture and food

5 Schedule a Meeting - Zoom

Preview text

: s: e:

Chapter 4 - Networks and Cloud Computing

True / False
The United States has high Internet penetration among its population constituting the majority of
people online. a. True

b. Fals e

ANSWER: Fals e

The Internet is the infrastructure on which the Web exists. a. True

b. Fals e

ANSWER: True

Sensors that can monitor and report on data about traffic and parking conditions are part of a network
of physical objects known as the Internet of Technology. a. True

b. Fals e

ANSWER: Fals e

The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain
names. a. True

b. Fals e

ANSWER: Fals e

Cascading Style Sheets (CSS) use special Hypertext Markup Language (HTML) tags to globally define font
characteristics for a variety of page elements as well as how those elements are laid out on a Web page.
a. True
b. Fals e

ANSWER: True

Like other programs, Java software can run only on specific types of computers. a. True

b. Fals e

ANSWER: Fals e

Organizations that are concerned about the security of their data should not use public cloud
computing. a. True

: s: e:

Chapter 4 - Networks and Cloud Computing

b. Fals e

ANSWER: True

JavaScript can be used to validate data entry in a Web form. a. True

b. Fals e

ANSWER: True

Twitter is a microblogging service. a. True

b. Fals e
ANSWER: True

A podcast is a video broadcast over the Internet. a. True

b. Fals e

ANSWER: Fals e

Video content can be placed on the Internet using the same approach as a blog. a. True

b. Fals e

ANSWER: True

There is no way a manufacturing firm would implement an Internet of Things because the risk of hacking
is far too high. a. True

b. Fals e

ANSWER: Fals e

Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web
browser. a. True

b. Fals e

ANSWER: Fals e

The Internet is a hyperlink-based system that uses a client/server model.

: s: e:
Chapter 4 - Networks and Cloud Computing

b. Fals e

ANSWER: Fals e

A client is any computer on a network that sends messages requesting services from the servers on the
network. a. True

b. Fals e

ANSWER: True

Network management software is a system software that controls the computer systems and devices on
a network and allows them to communicate with each other. a. True

b. Fals e

ANSWER: Fals e

A virtual private network (VPN) supports a secure, encrypted connection between a company’s
employees and remote users through a third-party service provider. a. True

b. Fals e

ANSWER: True

24. When you use your lab computer to access a printer, you are using the local area network (LAN).

a. True
b. Fals e

ANSWER: True

25. When you point the remote control to turn on/off the TV, the remote is using radio frequency.

a. True

b. Fals e

ANSWER: True

Multiple Choice

The ancestor of the Internet was _____. a. TCP/I P

b. the ARPANET

c. Telnet d. Web 1.

ANSWER: b

: s: e:

Chapter 4 - Networks and Cloud Computing

_____ is a communication standard that enables computers to route communications traffic from one
network to another as needed. a. The ARPANET b. A Uniform Resource Locator (URL)

c. The Internet Protocol (IP)


d. A Wi-Fi

ANSWER: c

The fiber-optic cables that span the globe over land and under sea make up the Internet _____. a.
ultrastructur e

b. backbone

c. layer d. protocol

ANSWER: b

The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for
many more devices. a. 32-bit b. 64-bit

c. 128-bit d. 256-bit

ANSWER: c

_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and
markup languages that combine to deliver information and services over the Internet. a. The Web b. A
tag

c. A cache d. The motherboard

ANSWER: a
Which of the following is a markup language for defining the visual design of a Web page or group of
pages? a. JavaScrip t

b. Cascading Style Sheets (CSS)

c. Java d. Extensible Markup Language (XML)

ANSWER: b

The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to
handle the business of registering domain names. a. registry operators b. accredited domain name
registrars

c. network information centers

d. independent domain name registries

ANSWER: b

Domain names must always have at least _____ parts, with each part separated by a dot (period). a. two
b. three

c. four d. five

ANSWER: a

_____ refers to a computing environment where software and storage are provided as an Internet
service and accessed with a Web browser.

: s: e:
Chapter 4 - Networks and Cloud Computing

c. Tunneling d. Internet censorship

ANSWER: b

_____ is a very short-range wireless connectivity technology designed for consumer electronics, cell
phones, and credit cards. a. Microwave transmission b. Wireless mesh

c. Near field communication (NFC)

d. Wi-Fi

ANSWER: c

In a _____, all network devices are connected to a common backbone that serves as a shared
communications medium. a. star network b. bus network

c. ring network

d. mesh network

ANSWER: b

The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
a. reception area b. hot spot

c. coverage zone

d. access area
ANSWER: b

A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at
any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.
a. very small aperture terminal (VSAT) b. microwave

c. low earth orbit (LEO) d. geostationary

ANSWER: c

A _____ network is one in which all network devices are connected to one another through a single
central device called the hub node. a. mes h

b. personal

c. bus d. star

ANSWER: d

A _____ is a telecommunications network that connects users and their computers in a geographical
area that spans a campus or a city. a. metropolitan area network (MAN)

b. local area network (LAN)

c. wide area network (WAN) d. personal area network (PAN)

ANSWER: a

Which of the following statements is true of network-management software? a of the disadvantages of


network- b network-management software, a
: s: e:

Chapter 4 - Networks and Cloud Computing

management software is the large amount of time spent on routine tasks.

manager on a networked personal computer can scan for viruses. c-management software allows
software to be copied, modified, or downloaded legally or illegally.

d-management software complicates the process of updating files and programs on computers on the
network.

ANSWER: b

When you connect your computer to a printer using _____, the distance between them cannot be
longer than 30 feet. a. Bluetooth

b. Wi-Fi

c. near field communication

d. infrared

ANSWER: a

When you are looking for a 'hotspot', you are searching for _____. a. a wireless access point

b. bluetooth signals

c. free charging stations


d. strong satellite signals

ANSWER: a

Which of the following systems can help identify your geolocation? a. Geographic information systems

b. Extranets

c. VPNs

d. GPS

ANSWER: d

If your home air conditioner has an IP address, it is part of the ____. a. satellite communication network

b. virtual private network

c. Internet of Things

d. satellite communication network

ANSWER: c

Suppose a business wishes to have access to servers, and storage devices, but does not want to buy
them. What is their best choice? a. Internet of Things

b. cloud computing - infrastructure as a service


c. cloud computing - software as a service

: s: e:

Chapter 4 - Networks and Cloud Computing

_____ is the control or suppression of the publishing or accessing of information on the Internet.

ANSWER: Internet censorship

The ARPANET was eventually broken into two networks: _____, which included all military sites, and a
new, smaller ARPANET, which included all the nonmilitary sites. ANSWER: MILNET

Messages on the Internet are typically sent through one or more _____ to reach their destination.

ANSWER: routers

_____ is the process by which virtual private networks (VPNs) transfer information by encapsulating
traffic in Internet Protocol (IP) packets over the Internet. ANSWER: Tunneling

The _____ is the primary method for interacting with the Internet. ANSWER: Hypertext Transfer
Protocol (HTTP) Hypertext Transfer Protocol HTTP

_____ computing refers to deployments in which service providers offer their cloud-based services to
the general public. ANSWER: Public cloud

A(n) _____ is an HTML code that tells the Web browser how to format text—such as a heading, as a list,
or as body text—and whether images, sound, and other elements should be inserted.
ANSWER: tag

_____ is a popular programming language for client-side applications that enable a user to create
interactive Web pages that respond to user actions.

ANSWER: JavaScript

Using _____, Web users can jump between Web pages stored on various Web servers, creating the
illusion of interacting with one big computer.

ANSWER: hyperlinks

The Uniform Resource Locator (URL) cengage is an example of a(n) _____ that identifies the Internet
host site. ANSWER: domain name

Web _____ such as Adobe Flash and Real Player, provide additional features to standard Web sites.
ANSWER: plug- ins

_____ is a method of transferring large media files over the Internet so that the data stream of voice and
pictures plays more or less continuously as the file is being downloaded.

: s: e:

Chapter 4 - Networks and Cloud Computing

ANSWER: Content streaming

A(n) _____ is a Website that people can create and use to write about their observations, experiences,
and opinions on a wide range of topics. ANSWER: Web log blog
The Web, as a computing platform that supports software applications and the sharing of information
among users, is referred to as _____.

ANSWER: Web 2.

_____ is online, real-time communication between two or more people who are connected to the
Internet. ANSWER: Instant messaging

The use of social media in business is called _____. ANSWER: Enterprise

The computers and devices on a network are also known as _____. ANSWER: network nodes

A(n) ______ is a telecommunications network that connects large geographic areas. ANSWER: wide area
network (WAN) wide area network WAN

Usually measured in bits per second (bps), _____ refers to the rate at which data is exchanged.

ANSWER: channel bandwidth

Online ____ vendors use digital rights management to prevent illegal copying. ANSWER: music audio file
media file

The browsers are the _____ in the worldwide web, whereas the web servers are the servers. ANSWER:
clients client machines client computers client solftware client client programs

George is in charge of ordering supplies for his employer, and he usually buys these supplies from the
same vendors. One of the vendors, Business Office Supplies, has given George limited access to their
inventory system so that he can see
English (US)

United States

Company

About Us

Studocu World University Ranking 2023

E-Learning Statistics

Doing Good

Academic Integrity

Jobs

Blog

Dutch Website

Contact & Help

F.A.Q.

Contact

Newsroom

Legal

Terms

Privacy Policy

Cookie Statement

Google Play Link

Copyright © 2023 StudeerSnel B.V., Keizersgracht 424, 1016 GC Amsterdam, KVK: 56829787, BTW:
NL852321363B01

You might also like