ログイン

管理資訊系統KC6/7/8

管理資訊系統KC6/7/8
35問 • 1年前
  • 翁凌
  • 通報

    問題一覧

  • 1

    A characteristic or quality that describes a particular database entity is called a(n):

    attribute.

  • 2

    Data __________ occurs when the same data is duplicated in multiple files of a database

    redundancy

  • 3

    The logical view of a database:

    presents data as they would be perceived by end users.

  • 4

    A(n) __________ represent data as two-dimensional tables.

    relational DBMS

  • 5

    Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

    Data dictionary

  • 6

    Which of the following is the most prominent data manipulation language today?

    SQL

  • 7

    The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

    normalization

  • 8

    The term big data refers to all of the following except:

    datasets with fewer than a billion records.

  • 9

    Data mining allows users to:

    find hidden relationships in data.

  • 10

    _________ tools are used to analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.

    Text mining

  • 11

    Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

    Router

  • 12

    What are the four layers of the TCP/IP reference model?

    Application, Transport, Internet, and Link Interface

  • 13

    On which of the following protocols is the Internet based?"

    TCP/IP,

  • 14

    A(n) ______ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

    digital

  • 15

    What service converts natural language names to IP addresses?

    DNS

  • 16

    IPv6 has been developed in order to:

    create more IP addresses,

  • 17

    Web browser software requests web pages from the Internet using which of the following protocols?"

    HTTP

  • 18

    Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

    uniform resource locator,

  • 19

    Which of the following pulls content from websites and feeds it automatically to users' computers?

    RSS

  • 20

    A(n) ______ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

    ISP

  • 21

    All of the following are physical components of an RFID system except:

    bar codes

  • 22

    4G networks use which of the following standards

    LTE and WiMax

  • 23

    Bluetooth can be used to link up to ______ devices within a 10-meter area using low-power, radio-based communication.

    eight

  • 24

    The 802.11 set of standards is known as:

    Wi-Fi

  • 25

    Which of the following would be the best use of RFID for a business?

    Managing the supply chain

  • 26

    WannaCry is an example of which of the following?

    Ransomware

  • 27

    Trojan horse

    is software that appears to be benign but does something other than expected.

  • 28

    Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) _______ attack.

    DDoS

  • 29

    An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website which asks for personal information is an example of:

    spear phishing

  • 30

    When hackers gain access to a database containing your personal private information, this is an example of:

    identity theft.

  • 31

    Two-factor authentication utilizes a(n):

    a multistep process of authentication

  • 32

    A firewall allows the organization to:

    enforce a security policy on data exchanged between its network and the Internet.

  • 33

    Currently, the protocols used for secure information transfer over the Internet are:

    SSL, TLS, and S-HTTP.

  • 34

    In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

    Symmetric key encryption

  • 35

    Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

    UTM

  • IELTS speaking-part 1

    IELTS speaking-part 1

    翁凌 · 35問 · 9ヶ月前

    IELTS speaking-part 1

    IELTS speaking-part 1

    35問 • 9ヶ月前
    翁凌

    管理資訊系統KC9/10/11

    管理資訊系統KC9/10/11

    翁凌 · 30問 · 1年前

    管理資訊系統KC9/10/11

    管理資訊系統KC9/10/11

    30問 • 1年前
    翁凌

    管理資訊系統KC:1/2

    管理資訊系統KC:1/2

    翁凌 · 35問 · 1年前

    管理資訊系統KC:1/2

    管理資訊系統KC:1/2

    35問 • 1年前
    翁凌

    管理資訊系統KC:3/4/5

    管理資訊系統KC:3/4/5

    翁凌 · 30問 · 1年前

    管理資訊系統KC:3/4/5

    管理資訊系統KC:3/4/5

    30問 • 1年前
    翁凌

    室內設計傢俱欣賞

    室內設計傢俱欣賞

    翁凌 · 25問 · 1年前

    室內設計傢俱欣賞

    室內設計傢俱欣賞

    25問 • 1年前
    翁凌

    問題一覧

  • 1

    A characteristic or quality that describes a particular database entity is called a(n):

    attribute.

  • 2

    Data __________ occurs when the same data is duplicated in multiple files of a database

    redundancy

  • 3

    The logical view of a database:

    presents data as they would be perceived by end users.

  • 4

    A(n) __________ represent data as two-dimensional tables.

    relational DBMS

  • 5

    Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security?

    Data dictionary

  • 6

    Which of the following is the most prominent data manipulation language today?

    SQL

  • 7

    The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

    normalization

  • 8

    The term big data refers to all of the following except:

    datasets with fewer than a billion records.

  • 9

    Data mining allows users to:

    find hidden relationships in data.

  • 10

    _________ tools are used to analyze large unstructured data sets, such as email, memos, and survey responses to discover patterns and relationships.

    Text mining

  • 11

    Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

    Router

  • 12

    What are the four layers of the TCP/IP reference model?

    Application, Transport, Internet, and Link Interface

  • 13

    On which of the following protocols is the Internet based?"

    TCP/IP,

  • 14

    A(n) ______ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

    digital

  • 15

    What service converts natural language names to IP addresses?

    DNS

  • 16

    IPv6 has been developed in order to:

    create more IP addresses,

  • 17

    Web browser software requests web pages from the Internet using which of the following protocols?"

    HTTP

  • 18

    Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n):

    uniform resource locator,

  • 19

    Which of the following pulls content from websites and feeds it automatically to users' computers?

    RSS

  • 20

    A(n) ______ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

    ISP

  • 21

    All of the following are physical components of an RFID system except:

    bar codes

  • 22

    4G networks use which of the following standards

    LTE and WiMax

  • 23

    Bluetooth can be used to link up to ______ devices within a 10-meter area using low-power, radio-based communication.

    eight

  • 24

    The 802.11 set of standards is known as:

    Wi-Fi

  • 25

    Which of the following would be the best use of RFID for a business?

    Managing the supply chain

  • 26

    WannaCry is an example of which of the following?

    Ransomware

  • 27

    Trojan horse

    is software that appears to be benign but does something other than expected.

  • 28

    Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) _______ attack.

    DDoS

  • 29

    An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent website which asks for personal information is an example of:

    spear phishing

  • 30

    When hackers gain access to a database containing your personal private information, this is an example of:

    identity theft.

  • 31

    Two-factor authentication utilizes a(n):

    a multistep process of authentication

  • 32

    A firewall allows the organization to:

    enforce a security policy on data exchanged between its network and the Internet.

  • 33

    Currently, the protocols used for secure information transfer over the Internet are:

    SSL, TLS, and S-HTTP.

  • 34

    In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

    Symmetric key encryption

  • 35

    Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.

    UTM