Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.The typical computing configuration in 1960 was ________. A. client/server B.

ID: 365283 • Letter: 1

Question

1.The typical computing configuration in 1960 was ________.A.

client/server

B.

enterprise computing

C.

mainframe

D.

cloud computing

E.

personal computer

2.The field that uniquely identifies a row in a relational database table is called a ________.

A.

primary key

B.

data definition language

C.

null value

D.

foreign key

E.

column

3.According to your reading, Macy's uses ________ technology to track individual items for sale on store shelves.

A.

business intelligence

B.

RFID

C.

XBRL

D.

business data

E.

XML

4. ________ are used to track movements of products through the supply chain.

A.

RFIDs

B.

Digital firms

C.

System trackers

D.

Digital footprints

E.

Digital trackers

5. ________ help(s) ensure that important network traffic receives high priority, and less-critical network traffic receives lower priority.

A.

Public key infrastructure

B.

Deep packet inspection (DPI)

C.

Information technology (IT)

D.

Managed security service providers (MSSP)

E.

Fault-tolerant computer systems

6. ________ is used to ensure the person is who he/she claims to be.

A.

Authentication

B.

An encryption

C.

Knowledge management

D.

Data mining

E.

A production worker

7. An intrusion detection system (IDS) ________.

A.

is a hardware component related to computer monitors

B.

causes damage to a system

C.

creates phishing problems

D.

helps protect a system using full-time monitoring tools

E.

is a social media application

8. ________ are data files used to identify and protect online transactions using a trusted third party.

A.

Digital certificates

B.

SSL

C.

Analog certificates

D.

Analog confirmations

E.

Digital confirmations

Explanation / Answer

1.   It was a personal computer, so right option is E personal computer.

2.   It is primary key which helps to relational database to identify unique row. So, right option is A.

3. Right option is RFID, which help to identify tags of product in shelves. So, the right option is B.

4.The right option is system tracker, which help to track movements of products. Right option is C.