info sys Flashcards

(55 cards)

1
Q

The _____ is the part of a computer that executes the instructions of a computer program.

A

microprocessor

The microprocessor is often referred to as the brain of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an example of volatile memory?

A

Random-access memory – Loses content when power is turned off.

Volatile memory requires power to maintain the stored information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players.

A

Flash memory – Retains data even when power is off.

Flash memory is widely used for its durability and speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____ are substances that are capable of enabling as well as inhibiting the flow of electricity.

A

Semiconductors – Conduct electricity under certain conditions, essential for electronics.

Semiconductors are crucial for modern electronic devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The third wave of computing was characterized by the introduction of _____.

A

personal computers – PCs brought computing to individuals and small businesses.

This wave marked a significant shift in computing accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1____ = 1 billion bytes

A

gigabyte

A gigabyte is commonly used to measure data storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1 petabyte = 1 _____ bytes

A

quadrillion

A petabyte is a large unit of digital information storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Moore’s Law kicked in during the 1970s for the ___________.

A

second wave

This wave saw significant advancements in microprocessor technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory?

A

Chip manufacturers leverage the higher costs of chip-based products to their advantage by keeping supply low compared to demand.

This strategy helps manage production costs and market dynamics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firmware refers to:

A

control software stored on nonvolatile memory chips.

Firmware is essential for the operation of hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software (often on firmware) designed to make physical products and devices “smarter” is referred to as ___________.

A

Embedded systems

Embedded systems are integral to modern electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ perform the work that users and firms are directly interested in accomplishing.

A

Applications

Applications are designed for specific tasks and user needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an example of application software?

A

MS Word

Application software is used for end-user tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ refers to applications installed on a personal computer for single-user tasks.

A

Desktop software

Desktop software is tailored for individual use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which function is likely performed by enterprise software?

A

Inventory tracking

Enterprise software supports large-scale business operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ integrates many business functions, such as accounting, finance, HR.

A

Enterprise resource planning

ERP systems streamline business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Systems that use data created by other systems for reporting and decision-making are called _____ systems.

A

business intelligence

Business intelligence systems analyze data for strategic insights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Implications for firms without consistent database systems:

A

They struggle to manage their value chain efficiently.

Inconsistent databases can lead to operational inefficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cost of producing an additional unit:

A

marginal cost

Marginal cost is a key concept in economics and production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Software is extremely profitable because:

A

the marginal cost to produce an additional copy is effectively zero.

This characteristic makes software a highly scalable business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ refers to software that is free and can be modified.

A

Open source software

Open source software encourages community collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Outdated notion regarding open source:

A

OSS is fueled by loners contributing for glory.

This perception overlooks the collaborative nature of open source development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True statement on open source software:

A

Linux is the flagship OSS product, available on all scales of computing devices.

Linux is widely used in various applications and devices.

24
Q

LAMP stack constituents:

A
  • Linux
  • Apache
  • MySQL
  • Perl

The LAMP stack is a popular framework for web development.

25
LAMP stack is used:
to power many of the Internet’s most popular websites ## Footnote The LAMP stack provides a robust environment for web applications.
26
Not true about potential benefits of platforms:
all of the above are true ## Footnote Platforms can enhance product utility and market reach.
27
_____ support interoperable machine-to-machine interaction.
Web services ## Footnote Web services enable different systems to communicate effectively.
28
_____ is a standard for exchanging formatted messages.
EDI ## Footnote EDI facilitates electronic data interchange between businesses.
29
Most common function of **EDI**:
Sending electronic equivalents of structured documents ## Footnote EDI streamlines business communications.
30
Technologies replacing older **EDI**:
Both (a) and (c) ## Footnote JavaScript object notation and Extensible markup language are modern alternatives.
31
One of the factors that accelerated the development of the Internet during the 1990s was:
the invention of graphical Web browsing ## Footnote Graphical browsers made the Internet more accessible to the general public.
32
The address one types into a Web browser is also known as a:
uniform resource locator. ## Footnote A URL is essential for navigating the web.
33
Which of the following statements holds true for the term “**HTML**”?
It refers to the language used to create and format Web pages ## Footnote HTML is the backbone of web content.
34
Popular sites like Google and Yahoo! have several computers assigned to their host names because:
it ensures that the load of requests to their sites do not overwhelm a single computer ## Footnote This setup enhances reliability and performance.
35
A firm that provides hardware and services to run Web sites of others is known as a(n) _____:
Web hosting service ## Footnote Web hosting services are crucial for online presence.
36
What is an example of **cybersquatting**?
Acquiring a domain name to extort a firm, individual, or trademark holder ## Footnote Cybersquatting is a legal issue in domain name registration.
37
“HTML” is used to:
create and format Web pages ## Footnote HTML structures the content displayed on the web.
38
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
assigning domain names to different IP addresses ## Footnote DNS is essential for navigating the Internet.
39
A(n) _____ is a temporary storage space used to speed computing tasks:
cache ## Footnote Caches improve performance by storing frequently accessed data.
40
The fault-tolerant nature of the DNS ensures that:
the service continues functioning even if one nameserver goes down ## Footnote This reliability is crucial for web accessibility.
41
The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request:
cache poisoning ## Footnote Cache poisoning is a significant security concern in DNS.
42
Cyber criminals who infiltrate systems and collect data for illegal resale are called:
data harvesters ## Footnote Data harvesting is a common cybercrime.
43
Which aspect of international law would enable a cyber-criminal operating across borders to evade prosecution?
Non-existent extradition agreements between two countries ## Footnote Legal challenges complicate international cybercrime enforcement.
44
A research scientist passing on sensitive pharmaceutical data to a rival company is held responsible for:
Corporate espionage ## Footnote Corporate espionage involves the theft of confidential information.
45
An attack on the US power grid by terrorists or a foreign power is indicative of:
cyberwarfare ## Footnote Cyberwarfare represents a significant national security threat.
46
The term _____ originally referred to a particularly skilled programmer:
hacker ## Footnote The term has evolved to encompass various meanings in cybersecurity.
47
A(n) _____ is someone who uncovers computer weaknesses and reveals them without exploiting them:
white hat hacker ## Footnote White hat hackers help improve security by identifying vulnerabilities.
48
A protester seeking to make a political point by leveraging technology tools is called a(n) _____:
hacktivist ## Footnote Hacktivism combines activism with hacking.
49
Which of these would be an example of a **DDoS attack**?
Overloading a popular social networking site with inbound messages ## Footnote DDoS attacks aim to disrupt services by overwhelming them.
50
Which of the following statements is consistent with ground realities regarding **information security**?
Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today’s cyber-criminals ## Footnote The rapid evolution of cyber threats challenges law enforcement.
51
What is the **structure** of a URL?
protocol://domain/path ## Footnote Example: https://example.com/index.html
52
Define **IP Address**.
Unique device identifier. ## Footnote IPv4 (32-bit), IPv6 (128-bit). Essential for routing packets.
53
Differentiate between **HTML** and **XML**.
* HTML: web page structure * XML: structured data transfer (APIs) ## Footnote Example: XML sends product data to e-commerce site.
54
What is **Open Source Software**?
Free, modifiable software ## Footnote Examples: Linux, MySQL, Apache, Firefox; supported by community or corporations.
55
What does **Moore’s Law** state?
Transistor density doubles ~every 18–24 months ## Footnote Drives faster, smaller, cheaper devices, AI, mobile, cloud innovations.