Reference no: EM132206924
1. Describe the three classifications of application controls, and explain how companies utilize application controls to ensure that data are completely and accurately processed by the applications that are utilizing the data.
2. A _ (blank) _ is a flexible data model designed for managing large data sets across many distributed machines, scalability, and useful for simple queries of large volumes of data.
a. analytic platform system
b. non-relational database management system
c. data warehouse system
d. cloud database management system
e. relational database management system
3. In a _ (blank) _ environment, computer processing work is split between two types of machines with one being the user point of entry and the other handling processing and storing of data or managing network activities.
a. general computing
b. mainframe
c. client/server
d. personal computer
e. minicomputer
4. The layers of the TCP/IP reference model for communications are:
a. network, internet, transmission, control
b. transmission, control, internet, protocol
c. PC, switch, server, router, internet
d. NOS, hub, router, SDN
e. application, transport, internet, and network interface
5._ (blank) _ has the characteristics of on-demand self service, ubiquitous network access, location-dependent resource pooling, rapid elasticity, and measured service.
a. mobile digital computing
b. quantum computing
c. virtualization computing
d. cloud computing
e. green computing
6. Database management systems include capabilities for _ (blank) _ to display data in a more structured and polished format than a query.
a. big data
b. normalization
c. form generation
d. report generation
e. data manipulation
7. All of the following are issues that a database management system solves except:
a. data integrity
b. data inconsistency
c. program-data dependence
d. data inflexibility
e. data security
8. A communications processor that routes packets of data through different networks is known as a:
a. hub
b. router
c. switch
d. server
e. broadband
9. A _ (blank) _ can enable hackers to steal proprietary information from anywhere or help identify potential network trouble or criminal activity.
a. sniffer
b. spoofer
c. keylogger
d. cyber warrior
e. trojan horse
10. The integration of new infrastructure with older systems known as _ (blank) _ is an important aspect of software integration.
a. Unix systems
b. Linux systems
c. Android systems
d. client/server systems
e. legacy systems