1. Describe the three classifications of application controls, and explain how c
ID: 394794 • Letter: 1
Question
1. Describe the three classifications of application controls, and explain how companies utilize application controls to ensure that data are completely and accurately processed by the applications that are utilizing the data.
2.
A _ (blank) _ is a flexible data model designed for managing large data sets across many distributed machines, scalability, and useful for simple queries of large volumes of data.
Select one:
a. analytic platform system
b. non-relational database management system
c. data warehouse system
d. cloud database management system
e. relational database management system
3. In a _ (blank) _ environment, computer processing work is split between two types of machines with one being the user point of entry and the other handling processing and storing of data or managing network activities.
Select one:
a. general computing
b. mainframe
c. client/server
d. personal computer
e. minicomputer
4.
The layers of the TCP/IP reference model for communications are:
Select one:
a. network, internet, transmission, control
b. transmission, control, internet, protocol
c. PC, switch, server, router, internet
d. NOS, hub, router, SDN
e. application, transport, internet, and network interface
5.
_ (blank) _ has the characteristics of on-demand self service, ubiquitous network access, location-dependent resource pooling, rapid elasticity, and measured service.
Select one:
a. mobile digital computing
b. quantum computing
c. virtualization computing
d. cloud computing
e. green computing
6.
Database management systems include capabilities for _ (blank) _ to display data in a more structured and polished format than a query.
Select one:
a. big data
b. normalization
c. form generation
d. report generation
e. data manipulation
7.
All of the following are issues that a database management system solves except:
Select one:
a. data integrity
b. data inconsistency
c. program-data dependence
d. data inflexibility
e. data security
8.
A communications processor that routes packets of data through different networks is known as a:
Select one:
a. hub
b. router
c. switch
d. server
e. broadband
9.
A _ (blank) _ can enable hackers to steal proprietary information from anywhere or help identify potential network trouble or criminal activity.
Select one:
a. sniffer
b. spoofer
c. keylogger
d. cyber warrior
e. trojan horse
10.
The integration of new infrastructure with older systems known as _ (blank) _ is an important aspect of software integration.
Select one:
a. Unix systems
b. Linux systems
c. Android systems
d. client/server systems
e. legacy systems
Explanation / Answer
3. In a _ (blank) _ environment, computer processing work is split between two types of machines with one being the user point of entry and the other handling processing and storing of data or managing network activities.
Answer:- c. client/server
The layers of the TCP/IP reference model for communications are:
Answer:- e. application, transport, internet, and network interface
has the characteristics of on-demand self service, ubiquitous network access, location-dependent resource pooling, rapid elasticity, and measured service.
Answer:- d. cloud computing
Database management systems include capabilities for _ (blank) _ to display data in a more structured and polished format than a query.
Answer:- d. report generation
A communications processor that routes packets of data through different networks is known as a:
Answer:- Router
A _ _ can enable hackers to steal proprietary information from anywhere or help identify potential network trouble or criminal activity.
Answer:- a. Sniffer
The integration of new infrastructure with older systems known as _ (blank) _ is an important aspect of software integration.
Answer:- legacy systems
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.