Chapter 1 Review Questions

  • Chapter 9 Review Questions and Answers

    1. a) What is a database? A database is an organized collection of related data. b) How does an RDBMS store data? An RDBMS stores related data in tables. 2. What is one benefit of dividing data into tables? Dividing data into tables eliminates unnecessary data duplication, or data redundancy. 3. a) What is a database schema? A database schema is a description of the data and the organization of the data

    Words: 1840 - Pages: 8

  • Chapter 1 Questions Ans Application

    Eva Diaz Chapter 1 Questions and applications #1,2,3,5,6,7,10,15,16 1. a. Some of the agency problems encountered with the MNC come with the conflict of goals between a firm’s managers and shareholders when making decisions. Agency costs are larger for an MNC than for a purely domestic firm because managers of foreign subsidiaries may be tempted to focus on making decisions to serve their subsidiaries rather than the overall MNC. b. MNC’s with subsidiaries scattered

    Words: 858 - Pages: 4

  • Chapter 4 Review Questions 1-5

    Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology

    Words: 3229 - Pages: 13

  • Chapter 10 Exercises Review Questions 1-10

    Chapter 10 Exercises Review Questions 1-10 1. Define the term system architecture. Define the term scalability, and explain why it is important to consider scalability in system design. System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. Then, Scalability is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business

    Words: 404 - Pages: 2

  • Review Questions 1-10

    Module 9 Review Questions 1-10 1. Explain the main difference between a file-oriented system and a database system. a. A file-oriented system utilizes data in a regular OS file based format where a database system uses a database engine that organizes data in a database in a table format utilizing rows for each record. 2. What is a DBMS? Briefly describe the components of a DBMS. a. DBMS stands for Database Management System. A DBMS is a collection of tools, features, and interfaces that

    Words: 842 - Pages: 4

  • Review Questions: Chapter 1

    Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users

    Words: 2493 - Pages: 10

  • Chapter 2 Review Questions Solutions

    Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host

    Words: 897 - Pages: 4

  • Chapter 6 Review Questions

    Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and have cost estimates. Networks provide the project schedule

    Words: 541 - Pages: 3

  • Chapter 4 Review Question Answers

    Chapter 4 Review Questions 1. What are the five questions typically used in fact-finding? What additional questions can be asked during this process? The five questions are who, what, where, why, how. * Who? Who performs each of the procedures within the system? Why? Are the correct people performing the activity? Could other people perform the task more effectively? * What? What is being done? What procedures are being followed? Why is that process necessary? Often, Procedures

    Words: 1585 - Pages: 7

  • Review Questions Chapter 1 and 2

    Chapter 1 Review Questions (1.1 - 1.7) 1.1 Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. a) Data: Known facts that can be recorded and that have implicit meaning. b) Database: Collection of related data. c) DBMS: Is a collection of programs that enables users to maintain a database.

    Words: 3534 - Pages: 15

  • Chapter 1 Review Question

    Robert Jones Chapter 1 Review 1. Which of the following is true about 1 bit? 2. Which of the following terms means approximately 106 bytes 3. Which answer list the correct number of bits associated with each term 4. Which of the following answer are true about random-access memory (RAM) as it normally used inside a personal computer (Chose two answers) 5. This Chapter describes the concepts how a CPU reads the contents from RAM. Which of the following is true about the process off

    Words: 645 - Pages: 3

  • Chapter 2 Review Question

    chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations

    Words: 1762 - Pages: 8

  • Chapter 2 Review Questions

    1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce

    Words: 1114 - Pages: 5

  • Chapter 1 Review Questions

    1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet | c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte | b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? a. 8 bits per double word b. 32 bits

    Words: 1372 - Pages: 6

  • Nt1210 All Chapter Review Questions

    Chapter 1 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits Answer: C. The word bit means binary digit and represents a single binary number. As such, it can represent two states of information. To represent one number out of 10 decimal digits, or one character out of 26 in the English alphabet, multiple bits

    Words: 27621 - Pages: 111

  • Review Questions Chapter 8

    1-How do enterprise systems help businesses achieve operational excellence? • Define an enterprise system and explain how enterprise software works. • Describe how enterprise systems provide value for a business. Enterprise systems enable businesses to achieve operational excellence through increased profitability and sales margin; enterprise systems create an environment in which organizations can monitor their sales demand and predict future sales, applications retrieve vital information and

    Words: 948 - Pages: 4

  • Chapter 1 Essay Questions

    Chapter 1 Essay Questions: 1. Explain the relationships among the four functions of management. The four basic management functions are planning, influencing, and controlling. a. Planning involves choosing tasks that must be performed to attain organizational goals, outlining how the tasks must be performed, and indicating when they should be performed. b. Organizing-can be thought of as assigning the tasks developed under the planning function to various individuals or groups

    Words: 597 - Pages: 3

  • Chapter 7 Review Questions

    Chapter 7 Review Questions 1. What is a knowledge management system? a. A Knowledge management system attempt to help organizations achieve their goals. They usually help in means of increasing profits or reducing costs. 2. What is a chief knowledge officer? What are his or her duties? b. A chief knowledge officer is a top level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals

    Words: 605 - Pages: 3

  • Nt1210 Chapter 1 Review Questions

    Chapter 1 Review Questions 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represent one binary digit d. Represent four binary digits 2. Which of the following terms means approximately 106 bytes? a. Terabyte b. Megabyte c. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with each term?

    Words: 1374 - Pages: 6

  • Nt1430 Chapter 1 Questions

    1. What is free software? List three characteristics of free software. -Free software is software that users have the freedom to distribute and change. The three main characteristics of free software are: The source code has to be distributed with the program, you cannot restrict people from redistributing/modifying/using the software, and users must be allowed to redistribute modified versions under the same terms/licensing. 2. Why is Linux popular? Why is it popular in academia? -Linux

    Words: 750 - Pages: 3

  • Chapter 1 Questions

    Chapter 1: Introduction to Project Management TRUE/FALSE 1. Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. ANS: T Until the 1980s, project management primarily focused on providing schedule and resource data to top management in the military, computer, and construction industries. Today’s project management involves much more, and people in every industry and every country

    Words: 7714 - Pages: 31

  • Chapter 1 Assessment Questions

    Chapter 1 Assessment Questions 1. Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. A. True 2. Software manufacturers limit their liability when selling software using which of the following? A. End-User License Agreement 3. The ___ tenet of information systems security is concerned with the recovery time objective. C. Availability 4. Encrypting data on storage

    Words: 311 - Pages: 2

  • Chapter 6 Review Questions

    1. You are preparing to implement smart cards into your organization for all users. Which Windows Server 2003 service must you install in order to support smart card authentication? A: b. Certificate Service 2. Based on strong password characteristics, what is wrong with the password TiGer01? What would you recommend changing to make this password stronger? A: Do not use a full dictionary word, make it at least 8 characters, and add a symbol/special character to the password. 3. One

    Words: 425 - Pages: 2

  • Tb143 Review Questions Chapter 4

    1. A,B,C,E The motherboard is essential to computer operation in large part because of the two major buses it contains: the system bus and the I/O bus. Together, these buses carry all the information between the different parts of the computer. 2. A,C Motherboards use expansion slots to provide support for additional I/O devices and high- speed video/graphic cards. The most common slots are PCI, AGP, and PCI-Express. 3. A,B,C,D SCSI is a more diversified driver interface that can

    Words: 289 - Pages: 2

  • Chapter 11 Review Questions

    1. Network security is more often compromised from ___the inside____ than from external sources. 2. __Encryption____ is the last means of defense against data theft. 3. __Phishing___ is a social engineering practice in which a person attempts to glean access or authentication information by posing as someone who needs that information. 4. _Port Scanner___ software searches a node for open ports. 5. A router that is not configured to drop packets that match certain or suspicious characteristics

    Words: 317 - Pages: 2

  • Caff 321 Chapter 1-4 Review Questions

    MICHELLE LU - 011810966 CAFF 321 CHAPTER REVIEW QUESTIONS (1-4) Chapter 1 1. Why does Daniel Gilbert, author of Stumbling on Happiness, say that experiences might bring more satisfaction than durable goods? Do you agree or disagree? Although happiness is not easily defined and it really depends on who you ask and what their degree of happiness is in their life, Gilbert the author of Stumbling on Happiness, explains that experiences might bring more satisfaction than that of durable goods.  With

    Words: 2837 - Pages: 12

  • Chapter 30 Review Questions

    BL-162-01 March 2, 2015 Chapter 30 Review Questions 1. In this case, Alice worked as an agent of Peter. She was authorized to collect accounts. Peter wrongfully discharged Alice before the agreed upon termination of the agency. Peter failed to notify his customers of Alice’s termination. Alice continued to work as an agent and took collections from one of Peter’s clients, Tom. She also collected from a new prospect, Laura. She secured an order, collected payment, sent the order to Peter

    Words: 1283 - Pages: 6

  • Chapter 6 Review Questions

    1. Your organization routinely uses scripts, but as some employees have left, there are scripts that contain only command lines and no one is certain of their purpose. What steps can be taken to ensure a way for others to know the purpose of a script? C. Require that script writers place comment lines inside the scripts using the # symbol to begin each command line. 2. Which of the following shells enable the use of scripts? (Choose all that apply.) A. Bash B. csh D. zsh 3. You

    Words: 356 - Pages: 2

  • Chapter 1 Review

    1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can’t find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting? B. cat > Meeting 2. Before you make the note in Question 1, you decide to determine Friday’s date, so that you can include it in your note. What Linux command can you use to quickly determine the Friday’s date? A. cal 3. While you are typing a

    Words: 739 - Pages: 3

  • Database Design Chapter 1 Review Questions

    1. a. Data – Raw facts b. Field – An alphabetic or numeric character or group of characters that defines a characteristic of a person, place, or thing. c. Record – A collection of related fields. d. File – A named collection of related records 2. Data redundancy occurs when the same data are stored in multiple places unnecessarily. Have more than one incorrect copies of information can cause it. 3. Data independence exists when you can change the data storage characteristics without

    Words: 480 - Pages: 2

  • Nt1230 Chapter 1 Questions

    Evan Jones NT1230 Chapter 1 questions. Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except Starter, Home Basic, and Enterprise 2. The core module that provides all of the Windows 7 capability that isn’t language- or edition-specific is called minwin. 3. When you copy a file to a library, Windows Explorer

    Words: 520 - Pages: 3

  • Business Management Chapter 1 Review Questions

    Chapter 1 – Subject Review Questions 1. I have worked for my current boss, Mr. Ford, in the field of youth social services for nearly a decade. Due to his leadership, I have remained with the agency throughout tumultuous periods. He has always challenged his employees to strive for quality of service at the greatest speed possible. Mr. Ford organizes employees to create a dynamic workforce capable of adapting to changes affected by the macroenvironment. In an effort to continue to win Requests

    Words: 542 - Pages: 3

  • Chapter 1 Review Questions

    1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure protection (assuring the security of utility services) related

    Words: 855 - Pages: 4

  • Chapter 12 Review Questions

    SOLUTIONS TO REVIEW QUESTIONS 1. NFPOs provide goods and/or services to society without the expectation of profit, while profit-oriented organizations provide goods and/or services with the expectation of earning a profit. Many resources are provided to NFPOs without any expectation of remuneration or repayment, including volunteer services and gifts in cash or in kind. Providers of resources to a profit-oriented organization expect to receive remuneration and/or the eventual repayment

    Words: 1556 - Pages: 7

  • Chapter 2 Review Question

    Gunther Documet 9/14/2015 Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business

    Words: 334 - Pages: 2

  • Chapter 1 Review Questions

    CHAPTER 1 REVIEW QUESTIONS 1. Define each of the following terms: a) Data: raw data not processed. This usually includes telephone numbers, a date of birth, customer name etc. It has little meaning until it is turned into information. b) Field: A character or group of characters that has a specific meaning. A field is used to define and store data. c) Record: A logically connected set of one or more fields that describes a person, place, or thing.  d) File: A collection of

    Words: 1121 - Pages: 5

  • Chapter 8 Review Question

    1. How does resource scheduling tie to project priority? a. Resource scheduling is directly tied to the project priority when the priority system selects projects that best contribute to the organizations objectives, within the constraints of the resources available. “If all projects and their respective resources are computer scheduled, the feasibility and impact of adding a new project to those in process can be quickly assessed. With this information the project priority team will add a new project

    Words: 642 - Pages: 3

  • Ch. 1 Review Question

    Ch. 1 Review Questions 1. Redundancy is the duplication of data or storing of the same data in more than one place. Redundancy wastes space and can lead to inconsistencies in information. 2. Nondatabases are time consuming and have a definitive amount of entries that can be made. 3. Entity is a person, place, object, event, or idea in which you want to store data; attribute is a characteristic or property of an entity. 4. Relationship is an association between entities. One to many

    Words: 426 - Pages: 2

  • Chapter 1 Review Questions

    CHAPTER 1 SOLUTIONS 1-2 There is a demand for auditing in a free-market economy because in the agency relationship there is a natural conflict of interest between an absentee owner and a manager and due to the information asymmetry that exists between the owner and manager. As a result, the agent agrees to be monitored as part of his/her employment contract. Auditing appears to be a cost-effective form of monitoring. The empirical evidence suggests auditing was demanded prior to government

    Words: 857 - Pages: 4

  • Chapter 2 Review Questions

    Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and

    Words: 1152 - Pages: 5

  • Chapter 1 Review

    Chapter 1 Review Activities 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 b. Can be used to represent one character in the lowercase English alphabet c. Represents one binary digit d. Represents four binary digits 2. Which of the following terms means approximately 106 bytes? e. Terabyte f. Megabyte g. Gigabyte d. Kilobyte 3. Which answer lists the correct number of bits associated with

    Words: 1377 - Pages: 6

  • Unit 1 Review Question

    UNIT 1 REVIEW QUESTIONS Richard H. Hendrix Jr. Post University Author Note Programming Fundamentals CIS 200 taught by Mohamed Ben Haj Frej Chapter 1 Review Questions 3. Describe the role of each of the five main areas of the Alice interface: the World window, the Object tree, the Details area, the Editor area, and the Events area.  The World Window – Contains a view of the virtual Alice world. The set of blue arrows below the window controls the Alice camera, which provides you with the view

    Words: 641 - Pages: 3

  • Chapter 7 Review Questions

    1. They’re most like burglar alarms, because they’re both setup to detect intruders and alert users when a threat is detected. 2. A false positive seems like an alert. False negatives seem like normal activity. False positives are just a problem, and false negatives are failures in the systems. 3. A network-based IDPS monitors traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match

    Words: 541 - Pages: 3

  • Project Management Chapter 1 Review Questions

    Chapter 1: Review Questions 1. What is a project? It is a temporary effort intended to create a unique product, service, or result. 2. What is project management? It is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. 3. How are projects different from ongoing operations? Projects are temporary and unique while operations are continuous. Operations are an ongoing process to ensure that an organization continues to work

    Words: 868 - Pages: 4

  • Principles of Security 5th Edition Chapter 1 Review Questions

    Review Questions 1. What is the difference between a threat agent and a threat? A threat agent is a specific component that represents a danger to an organization’s assets. And a threat is an object, person or entity that represents a constant danger. 2. What is the difference between vulnerability and exposure? Vulnerability is a weakness is a system that leaves the system open to attacks. Exposure is the known vulnerabilities that make a system weak and open to attacks without protection

    Words: 829 - Pages: 4

  • Chapter 1 Question

    Chapter 1 Problems 1, 2, 3 = straightforward, intermediate, challenging Section 1.2 Matter and Model-Building Note: Consult the endpapers, appendices, and tables in the text whenever necessary in solving problems. For this chapter, Appendix B.3 may be particularly useful. Answers to odd-numbered problems appear in the back of the book. 1. A crystalline solid consists of atoms stacked up in a repeating lattice structure. Consider a crystal as shown in Figure P1.1a.

    Words: 4296 - Pages: 18

  • Sad Chapter 4 Review Questions

    Chapter 4 Review Questions   1. What are the five questions typically used in fact-finding? What additional questions can be asked during this process? The five questions are who, what, where, why, how.       * Who? Who performs each of the procedures within the system? Why? Are the correct people performing the activity? Could other people perform the task more effectively?       * What? What is being done? What procedures are being followed? Why is that process necessary? Often, Procedures

    Words: 1708 - Pages: 7

  • Principles of Information Security 4th Ed Chapter 1 Review Questions

    Kevin Kovack Chapter 1 Review Questions 1. What is the difference between a threat agent and a threat? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is open

    Words: 801 - Pages: 4

  • Chapter Review Question Solutions

    Chapter 3 ANSWERS TO QUESTIONS Q3­1 A primary objective of financial reporting is to provide information that is useful to present and potential investors and creditors and other users in making rational investment, credit, and similar decisions. An accounting system is the means by which a company records and stores the financial and managerial information from its transactions so that it can retrieve and report the information in an accounting statement. A double­entry system standardizes the method

    Words: 25366 - Pages: 102

  • Chapter 2 Review Questions

    Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This

    Words: 727 - Pages: 3

+
-