0 ratings0% found this document useful (0 votes) 448 views11 pagesINF1505 ExamQuestions
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
revision questions for exams
Multiple Choi
Identify the choice that best completes the statement or answers the question.
1
__ media operate on line-of
a Coaxial Terrestrial microwave
b. Multipoint Fiber optic
‘Typically, are used only in large enterprises because of their cost and installation complex
a. SANS ©. CD-ROMs
b. NAS hard disks
___refers to the accuracy of information resources within an organization.
a Availability © Confidentiality
b. Integrity Security
___ technology uses special hardware and software to give users the feeling of being part of an environment
= Tmmersion Interaction
Simulation Telepresence
data is information in its original form.
a Summary Raw
b. Open 4. Transformed
A typical PDA includes a(n) __.
a. external monitor © external keyboard
b. mouse calendar
A___ isan inexperienced, usually young hacker.
a. black hat white hat
b. wizard script kiddie
In the __ phase, analysts define the problem and generate alternates for solving it
a. requirements gathering and analysis c, design
. implementation planning
Using the ___ model transfers the old retail mode! to the e-commerce world by using the medium of the
Internet.
a. mixed ©. brokerage
b. advertising merchant
The decision maker defines associations between alternatives and criteria during the ___phase of the
ecision-making process,
a. intelligence
b. implementation
‘The ___ component of a DSS coordinates the other components.
a userinterface © DSSengine
b. model base database
The cost of industrial robots can range from ___and more
a. $10,000 to $30,000 ‘$100,000 to $250,000
b. $50,000 to $100,000 «$500,000 to $1,000,000
‘The term RAID stands for__
redundant access for independent devices
b. random access for independent disks
© redundant array of independent disks
random array of independent drives,
|. The __ topology is costly and difficult to maintain,
30.
34,
36,
40.
4
a bus star
b. ring mesh
components of a VR system enable users to see and hear the virtual world
a. Manual navigation control
bb. Visual and aural
Walker
4d. Central coordinating processor and software system,
Intelligent agents are also called
a. moles bots
b. rootkits rats
is. social networking Web site
a. Sony Music Group © Facebook
b. XML d. Droid
In the URL, htip//www.csub.edu/-hbidgoti/books.hunl, __ represents the name of a directory in which files
are stored
a. books.htsnl & wwwesubedu
b. http .hbidgoli
Which term refers tothe rate computed by dividing the mumber of clicks an ad gets y the total impressions
bought?
fa. cost per click rate(CPC) click-through rate (CTR)
b. cost per thousand (CPM) d._cost per impression rate (CPD)
TVs that adjust sereen color and texture for each frame and stabilize the volume based on the viewer's location
inthe room are demonstrating
personal agent qualities ©. fuzzy logic
b. surveillance 4. atificial neural capabilities
___uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world
environment
a WiFi Nanotechnology
b. VR technology WiMAX
refers to giving objects in a VR environment texture and shading for a 3-D appearance,
Telepresence ©. Simulation
Interaction Immersion
is a Web-based personal financial management service that is an example of SaaS.
Mint.com ©. Basecamp
Salesforce.com Google Talk
is the size of a character.
a. nibble word
b. byte a. bit
Extensive training is one solution to the problem of __ feasibility.
a. economic ©. technical
b. schedule operational
Cloud computing includes components in the form of ___as.a service (laaS)
a. Intemet infrastructure
b. investment information
are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or
Scholarly nature.
a. Discussion groups IRC
b. News groups d. E-mail groups
How data is stored on and retrieved from a hard disk is the —_ view.
physical ©. logical
b. hard copy storage
commerce fulfils the product information activity using
a phone calls, ©. Web sites
b. e-mail d. faxes
The most common way to index and link databases is using
a. names c. addresses
b. Social Security numbers 4d. driver’s license numbers
In the __, Matsushita in Japan built a viral kitchen that enabled customers to change fixtures and
appliances ane alter the design on a computer and then virtually walk around the kitchen space.
a. 1970s 1990s
bb. 1980s a. 20005
___ analysis is available in spreadsheet programs such as Microsoft Excel
a What-is . Whatif
b. Lookup . Cause-and-etfect
One advantage of grid computing is ___. meaning that if one node on the grid fails, another node can take
over.
a parallel processing scalability
b. improved reliability sharing
Integrating ___ into the SDLC process is a good idea to ensure the system’s success.
a checkpoints ©. operating costs
b. intangible benefits
A(n) RSS feed makes use of ___ to distribute Web content,
a. HTML, c. Twitter
b. XML podcasting
Nanotechnology incorporates techniques that involve the structure and composition of materials on a.
a. nanoframe © manobyte
b. nanometer nanoscale
Level | security involves __.
a. front-end servers, corporate networks
b. playsical secur back-end systems
Anattack by a___ hacker might not be an actual threat to an organization's security system.
a. black hat white hat
b. wizard script kiddie
‘The problem of missing deadlines is common inthe information systems field, but designers can often
‘minimize this problem by using __ tools.
a. dataflow €. project management
b. CASE flowchart
Record keeping, payroll, and simple inventory’ problems are examples of ___ tasks
a. unstructured ©. structured
b. automated semistructured
‘What is the first step in client/server communication?
a. The server receives the que
b. The results are formatted and displayed.
c. The user ereates a query
The client accepts a request.A.___ operation searches data ina table and retrieves records based on certain erteria
a. find €. project
b. join a. select
‘The main technology used in an exocentric environment is.
a. 3D graphics ©. VRD
b. HMD nanotechnology
‘The __is atthe center of the CPER process
a. rete © supplier
b. manufacturer 4. consumer
___ costs measure what you would miss by not having a system or feature.
a Investment ©. Economic
b. Opportunity 4. Operational
Scheduling and assigning employees might be handled by ata)
a. PIS ©. MEIS
bh LIS a. FIS
____are generated by Web server software, record a user's actions on a Web site
a Spam c. Viruses
b. Log files a. Logins
____computer conferencing includes an audio Tink but has no video.
a Desktop ©. Real-time
b. Analog a. Video
‘A podcast as a specifie and is defined with an XML item wg
a. DNS c. address
. transaction ID d. URL
TBM System 210 is an example of a___ generation computer.
a. second ©. fourth
b. third fifth
‘The ___ means you can use copyrighted material for certain purposes, such as quoting passages of a book in
literary reviews.
a. Copyright Act of 1994 ¢. Fair Use Doctrine
b. ACM Code of Ethies 4d. Digital Millennium Act
The ___ component of a VR system is an input device that captures and records movements of the user's feet
as the user walks or turns in different directions.
2. manual navigation control
b. visual and aural
©. walker
4. central coordinating processor and software system
memory, which is nonvolatile, holds data when the computer is off or during the course of a program’s
operation.
a. Open Raw
'b. Secondary 4d. Replicated
SOA advocates that core business functions and the dynamic functions that change all the time should be
a eliminated magnified
b. combined 4. decoupled
A__ shows a process at more general level and is helpful for showing top management and the task force
how a process works.
conceptual use model ©. data flow diagram
b @. flowchart
___is the opposite of buyer power
a. Rivalry among existing competitors ‘The thread of substitute products
b. Supplier power |. The threat of new entrants
Data mining agents work with a.
a. knowledge base data warehouse
b. catalog filter
Search engines use software called “crawlers”, “spiders” or ~
a. Web browsers ©. directories
b. HTML, a bots
Preparing a budget is an example of a(n) __ task
a. unstructured ©. automated
b. semistructured 4. structured
A decision maker examines the organization's environment for conditions that need decisions during the
phase of the decision-making process.
a. implementation © intelligence
b. choice d. design
Network administrators use___ technology to have antivirus updates downloaded on employees
‘workstations automatic
a. push pall
b. SaaS ASP
According to Symantec Corporation, in 2008 the number of computer viruses in existence exceeded one
hundred thousand © million
b. half million trillion
Bluetooth can be used to create a__.
a. LAN ©. PAN
b. WAN d. MAN
A Trojan program contains code intended to disrupt a computer, network, or Web site, and itis usually hidden
ina(n) program
a. popular rarely used
b. operating system application
attacks inundate a Web site or network with e-mails and other network traffic so that it becomes
Overloaded and can’t handle legitimate trafic.
a. Denial-of-service
b. Identity theft
During systems __a preliminary analysis of requirements is done first
4. implementation design
b. planning requirements gathering and analysis
Plant location isan strategic management ___ component of an organization.
adhoe semistructured
structured unstructured
__ report nonexistent viruses and may cause panic.
Virus hoaxes. Trojan programs
Backdoors Worms
During the design phase, the design involves selecting a specific platform such as Dell servers running
Ubuntu Linas,
©. physical
a. logical100.
101
102.
103.
107.
108,
110.
13.
ents usually track and report on computer equipment and network systems to predict when a system
failure might occur
Fuzzy logic © Monitoring and surveillance
Data mining Shopping and information
‘The main objective of ___ is to prevent purchases from suppliers that are not on the approved list of sellers
and to eliminate the provessing costs of purchases,
a. e-procurement e-business
b. e-marketing 4. third-party exchange marketplaces
‘The most common n-tier architecture involves tiers.
a two © four
b. three d. five
A__ protects new processes
a. ademark. Pair Use Doctrine
b. patent copyright
___ is understanding the role of information in generating and using business intelligence.
3. Taformation litera ©. Transaction processi
b. Computer literacy dd. Management information systems
A GIS includes __. which might show a river.
4. tines ©. points
b. areas regions
‘You encrypt a message with yout private key and use an algorithm that hashes the message and creates a_
a. plaintext message private key
bb. digital signature d._ message digest
isatype of memory that must be accessed sequentially.
RAID
magnetic tape
A(n) ___ database has the ability to represent more complex data relationships than a relational database.
a. distributed data-driven
b._clientéserver a. object-oriented
Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are
a. directories types of Internet connections
b. search engines navigational tools
Mobile commerce (m-commerce) is based on the __ protocol
a. EAP ©. WEP
b. WAP2 a. WaP
Future progress in___ includes further development in natural language processing that should make
information systemis easier to use
a computer criminals © compater literacy
b. artificial intelligence personal computing power
CASE tools are most useful during the ___ phase of the SDL.
a. design maintenance
. implementation planning
A cave automatic virtual environment (CAVE) is a viral environment consisting of a___-shaped room in
which the walls are rear projection screens.
a. estindrical ©. sphere
b. honeycombedt cube
___ scaling refers to adding more workstations (clients).
a Vertical c. Static
b. Dynamic 4. Horizontal
‘The first expert system, called DENDRAL, was developed in the mid-___at St
a. 1940s 1960s
b. 1950s d. 1970s
‘means all market participants can trade atthe same price.
ac Accessibility ¢.. Price transparency
b. Return on investment Customer service
WIMAX is based on the IEEE __ standard.
a 802.110 ©. 802.1In
b. 80211b 80216
are goals and objectives that decision makers establish in onder to achieve certain performance
a. Intangible milestones © Governance rules
b. Mission statements
). With __ technology, information is sent to users based on their previous inquiries, interests, or
specifications.
a agent push
b. smartcard a pull
A routing table lists —__
a. the IP address of the router
b. nodes on a network
¢. the protocols that each node understands,
the packets to be sent
___ is colleoting data from Web sites, usually for competitive intelligence.
a phishing ©. Data warehousing
b. Data harvesting 4. Web harvesting
Research and development is an example of a(n) __ task
3 unstructured structured
b. semistructured automated
A decision support system is particularly useful during the ___ phase of the decision-making process,
a. design ©. intelligence
b. choice 4. implementation
A(n)__works with the KBMS to ensure that the knowledge base is as up-to-date as possible
a. explanation facility heuristic
b. knowledge acquisition facility d._-meta-knowledge system
WiMAX can theoretically go up to speeds of __ Mbps.
a 12 & 40
b. 24 ad 128
Bluetooth 3.0 supports a theoretical speed of __Mbps.
a 12 © a8
b. 24 a. 128
A __ is hardware device that allows several nodes to share one communication channel
a. controller multiplexor
b. router front-end processor
An intranet server is placed __the DMZ.
a. infrontof ontop of
b. behind ain
High-level languages represent the ___ generation of computer languages,
third
b. second fourth
E-mail messages are sent using the ___ protocol.
a. POP ©
b. HTTP 4. VoIP
An example of ___ analysis involves entering a customer account number and having the system display the
customer's current balance
a. lookup. cause-and-effect
be what-is d. whatif
Ina bus topology, ___ are used at each end of the cable to absorb the signal
a. stoppers ©. emilators
b. terminators nodes
‘The end result of the ____phase should give users and top management a clear view of what the problem is
and how the information system will solve the problem
a desi planning
b. prototyping requirements
‘Transaction data for a CRM system might be gathered using
a abusiness plan ¢. grocery slore loyalty cards
b. inventory numbers d. ARFID chip
‘The hest approach to control the proliferation of invalid and inconsistent data in corporate databases is
controll
gthe of data,
a si © amount
b. flow use
A___ catalog displays product descriptions based on customers’ previous experiences and preferences,
a. logical physical
viral i nataral
‘The costs of a GSS implementation are high hecause the system includes many __
4. communication lines © consultants
b. users features
A__is built-in to a system by its designer
a. Togic bomb backdoor
b. worm virus
‘The ___ layer of the OST model specifies the electrical connections hetween computers and the transmission
medium, and defines the physical medium used for communication.
physical data link
b. session application
software, which is more powerful than spreadsheet software, is capable of performing many types
analysis on large amounts of data.
a. Graphics ©. Presentation
b. Word processing Financial planning
___uses multiple sources of information and provides multidimensional analysis,
a. OLAP cc. SQL
b. OLTP . QBE
As part of the _____phuase, the team collects performance data and gathers information on whether the system is
meeting its objectives by talking with users, customers, and other people affected by the new system.
a. planning ¢. maintenance
b. requirements gathering and analysis di, design
‘The supervisor program of an OS is called the __
a. job manager © resource allocaterMa.
Ls.
19.
120.
121
124.
128.
129.
130.
133.
134,
139.
140.
Mi
b. data manager kernel
A(n)__ system is used to coordinate operations, resources, and decision making between manufacturing
prochiction, marketing, and human resources,
a. CRM © Web portal
b SCM ERP
___is/are a supporting activity inthe value chain.
a. Logistics Operations
b. Service 4. Technological development
Resolving conflicts between to divisions is a tactical management ___ component of an organization
a. structured © semistructured
b. adhoc unstructured
‘The ___ acts asa liaison when building a DSS,
a. model builder end users
b. managerial designer technical designer
___ payment refers to money or script that is exchanged only electronically.
a. Digital c. Intemet
b. Autiomated Electronic
___ have been added to sports
urable and improve their responsiveness,
a. Nanometers REID tags
b. Data gloves Nanomaterials,
___ divides each channel into six time slots,
a Time Division Multiple Access (TDMA)
b. Mobile Telephone Switching Offices (MTSOs)
Transmission Control Protocol (TCP)
4d. Code Division Multiple Access (CDMA)
ar, such as tennis and golf balls and tennis rackets, to make them more
InfoH{ub.com is a(n) _ Web site.
a. healthcare travel and tourism
b. realestate education
The Clipboard’s contents ate stored on
a. ROM © RAM
b. EPROM d. PROM
A___attack typivally targets Internet servers
a. worm social engineering
b. logic bomb . denial-ot-service
__RFID tags can be embeded in a sticker or under the skin (human or animal)
a Active Passive
b. Open . Intemal
Grouping objects along with their attributes and methods into a class is called
4. inheritance ¢. distributed processing
b. replication encapsulation
A__ generates revenue from the fees charged for matching buyers and sellers,
a. third-party exchange marketplace trading partner agreement
bb. buyer-side marketplace d._seller-side marketplace
Symmetric DSL usually has an upstream rate of _ Mbps,
a 1S €
b. 24 a
‘main function is to provide information on security incidents, ineluding information systems’
Vulnerabilities, viruses, and malicious programs.
a. The McCumber cube's CERT’
b. CIRC's Sarbanes-Oxley
Microsoft can be used to create and modify a database
a. Excel Word
b. PowerPoint Access,
In backward chaining, the expert system starts with the ___ first.
a. “else” © goal
b. “if condition
A(n) __ isa peripheral deviee for recording, storing, and retrieving information.
a ALU disk drive
b. motherboard bus
js when end users develop their own information systems with litle or no formal assistance from the
information systems team.
a. Outsourcing ©. Self-sourcing
b. Sourcing Insourcing
With the ____model, users don’t need to be concerned with new software versions and compatibility problems
because the ASP offers the most recent version of the software
a. SaaS ©. CAVE
b. RFID aVR
Inthe Al field, __ engineers try to discover “rules of thumb” that enable computers to perform tasks usually
handled by humans.
a. knowledge © data
b. computer systems
‘To begin designing a relational database, you must define the ___ structure by defining each table and the
fields init
a. logical ©. physical
b. management security
When multiple pieces of data are sent simultaneously, this is__ communication
narrowband ©. Wide area
bb. broadband dd. modular
__isa site that facilitates C2C e-commerce.
a Walmart Gap
b. Amazon eBay
‘The __ is responsible for specifying data requirements, what models are needed, and how these models
might be used
a. managerial designer ©. technical designer
bb. model builder a. end user
___ enables business partners fo send and receive information on business transactions.
a EDI Supply chin
b. ERP a SCM
Information technologies include __
a internal data ©. Twitter
bb. the four Ms d. RFID tags
divides a project into smaller functions, and developers can't go on to the next phase until the current
phase is finished,
a XP © RAD157.
158.
159.
160.
161
162.
169.
170.
171
b. Agile d. IAD
. The ___ component of a ERP system collects and analyzes relevant internal and external data and
information,
a. unified database © CRM
b. supply chain 4. e-commerce
Digitized maps and___ oriented databases are two major components of a GIS.
a. linear © spatially
b. hierarchical relational
Microsoft Access is an example of the ____ component of an information system,
a. external data © process
b. database internal data
IBM Freelance is an example of __ software.
a. word processing presentation
>. spreadsheet graphics
A__ helps break down a complex process into simpler, more manageable, and more understandable
subprocesses.
a. data flow diagram conceptual use model
b. context diagram 4. flowchart
Any system connected to the Intermet running ___is subject to a denial of service attack.
a. TLS © SSL.
b. TCP «UDP
In adata flow diagram, processes are indicated with a(n)
a. rectangle © cele
b. diamond arrow
1. In data communication, ___ refers to integrating voice, video, and data so that multimedia information can be
used for decision making
a telepresence ©. teleprocessing
b. dynamic a. convergence
One notably growing application of data communication and convergence is
a. teleprocessing ©. centralization
b. telepresenc convergence
intelligence applications might be helpful in the future for handling qualitative decisions
a Automated ©. Artificial
b. Unsiruetured Structured
‘The Transmission Control Protocol (TCP) operates at the OSI model's _ layer.
a physical ©. transport
b. data tink 4. notwork
Prototyping is usually done in four steps, the last of which is__.
a. reviewing and evaluating the prototype c. developiig the prototype
'. defining the intial requirements 4. revising the prototype
|. Users access a DSS through the __ component.
a. database c. DSS engine
b. user interface model base
Ain) ____ denotes the type of organization or country the address specifies,
a TLD c. DNS
b. URL a DP
cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to forma light path
through wire cables.
a. Coaxial & Fiberoptie
b. Copper line a. Twisted-pair
cold be used to make sure people don’t vote more than once.
a Nanotechnology c. REID tags
b. Biometrics Utility computing
___ RFID tags have no internal power supply
a. Passive ©. Active
b. Internal Closed
A___ plan lists the tasks that must be performed to restore damaged data and equipment.
a. disaster recovery risk assessment
b. business continuity security compliance
Hackers often use phishing to information,
a. extort delete
>. intercept modify
Ina supply chain, flow to the supplier
a. manufacturing maw materials
b. customers consumers
AA database is collection of related that can be stored! in a central location or in multiple locations.
a indices c. data
b. keys arrays
LANs are used most often to__.
a. link computers that are geographically far apart
bb. provide wireless networking services
inlegrate services, such as e-mail and file sharing
4. provide Internet service to cellular phones including smuutphones
Crisis response is an example of a___ e-government application,
a G2B ©. G2G
b. GC d. G2E
Input devices send data and information to a(n)
a. vacuum tube computer
b. CPU case ALU
__is a common interorganizational system (10S),
a RSS feed «2
b. Web 2.0 a. EDI
‘The __ approach to setting up a distributed database addresses how tables are divided among multiple
locaiions,
a. data-driven . allocation
b. 4d. fragmentation
AGIS i ‘which might show the location of an airport
a. points . regions
b. areas lines
‘The idea of the value chain was developed in
a. 1975 1985
b. 1980 1990
With __. you request data from a database by constructing a statement made up of query forms,
a. the database engine structured query language
b. query by example select
Distributing data among multiple sites minimizes the effects of computera fragmentation ¢. encapsulation
b. replication failures
172. Generally, managers perform six tasks for which an EIS is useful. One of these is
a. tracking inventory © working in groups,
b. communicating via videoconferencing —d. spotting trends,
173. A___isa computer and all software for managing network resources and offering services to 4 network
a. NAS server
b. SAN . RAID
174, RFID tags have been decreasing in price and are currently less than __per tag.
a. Scents Scents
b. 10 cents dU dollar
175. Al technologies apply __to areas that require knowledge, perception, reasoning, understanding and
cognitive abilities,
a. user requirements ©. strategies
b. computers manual processes
176. A___ operation pares down a table by eliminating columns (fields) according to certain criteria
a. select © join
bb. project find
177. Intelligent agents demonstrate ___ the capability to select problems or situations that need attention and act
om them.
a. reactivity adaptability
b. collaborative behavior a. mobility
178. Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing habits: this is
an example of
a. customization © personalization
b. customer relationship management supply chain management
179. aims) at inereasing a Web site's performance on seateh engines in a natural (and free) fashion.
a SEO ¢. Micropayments
b. XML Meta t
180. CD-ROMs and DVDs are examples of __ disks.
a. tape © optical
b. flash a. magnetic
181. Using the Intemet and Web protocols for EDI lowers the cost of __ documents
a. reviewing transmitting
b. creating storing
182. Transistors were the major technology for the __ generation of hardware.
a. first © third
b. second fourth
183. Using __ software, you can perform “what if” analysis on data.
a. word processing ©. graphies
b. kemel spreadsheet
184, With the __ records can be accessed sequentially or randomly, depending on the number being accessed.
a. indexed sequential access method ©. hypercube structure
bb. random access structure sequential file structure
Organizations with an established IT infrastructure often choose a(n) _ CRM, which is implemented much
like any other IT system,
a. local distant
b. Web-based on-premise
186. A__ travels from computer to computer, in a network, but it doesn’t usually erase data
a. Trojan program worm
b. virus backdoor
187. In____ encryption, the same key is used to encrypt and decrypt the message.
a. nonrepudiation © asymmeitic
b. TLS symmetric
188. .was developed so that users could communicate with computers in their own langu:
a. ANN c. Virtual catalog technology
b. Personal agent technology NLP
189, One major obstacle to using VR technology is that not eno are currently available
a. computers & manomate
b. educated users fiber optic cables
190, ASCII defines up to___ characters
a8 258
b. 128 1024
191 perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs,
a Natural language processors ©. Robots
b. Neural networks d._ Knowledge bases
192. searches for specific information or patterns, using input from multiple business partners and data
Sources,
a. Knowledge management ©. Personalization
b. Collaborative filtering Customization
193. Shopping and ___agents help users navigate through the vast resources available on the Web.
a. information © open-source:
b. lookup public
194, The first generation of computer languages consists of a series of ___ representing data or instructions
a Is ©. macros
b. Os d. Osand Is
195. The embedded references in hypermedia documents are called
c. hyperareas
b text media
196. ___ security measures use a physiological element to enhance security measures,
a Social engineering Alternative
b. Biometric 4. Biofeedback
197. __consists of rules related to a problem or discipline.
a Expert knowledge ©. Factual knowledge
b. Heuristic knowledge d. Meta-knowledge
198, Java and C++ are __ computer la
‘a fourth generation assembly
b. fifth generation high-level
199, Mergers area strategie management __ component of an organization
a. unstructured ©. structured
b. adhoc semistructured
200, Spamming has created __ concerns, because the e-mails often contain explicit language or mudity
a. privacy © sniffing
b. decency fraud
201, The most widely used input device isthe
a. keyboard touch sereenb. MICR d. mouse
. _offers & 3-D virtual reality platform.
219.
220,
221,
200.
228,
i Active Worlds ©. Habbo
b. Second Lift Runescape
08s allow several users to use computer resources simultaneously.
a. Hierarchical ©. Web-driven
b. Kernel d. Time-shared
‘The most common data model is the _ model
a. relational ¢._ hierarchical
b. object-oriented network
A(n) __ isthe link between devices connected to the computer
a. logic unit ©. contrat unit
b. bus a ALU
layer of the OSI model generates the receiver's address and ensures the int
sure packets are delivered without error, in sequence, and with no loss ord
entation © transport
application session
In___conversion, the old and new systems run simultaneously for a shor time to ensure thatthe new system
‘works correctly
a. phased-in-phased-out ©. plunge
b. parallel a. pilot
A(n) __ is atype of Web site that allows users to add, delete, and sometimes modify content
a. blog wiki
bh. RSS feed 4. ‘social networking site
In an expert system, a(n) ___engine is similar to the model base component of a decision support system,
a. factual ©. inference
b. explanation a. knowledge
‘The Internet? (I2) project started in 1987 and has been planned as a(n) _ network
a. open-source centralized
b. static
___is a popular on-line payment system used in many on-line auction sites,
a Smart card cc. Eash
b. E-wallet a PayPal
is registering, selling, or using a domain name to profit ftom someone else's trademark
a The Unfair Use Doctrine ©. Cyberbullying
b. The digital divide Cybersquatting
___robots have limited mobility, limited vision, and some speech capabilities.
a. Industrial © Al
b. Toy Personal
AGIS uses___data.
a. spatial and monspatial ©. regional
buffered a relative
With ___ outsourcing, the organization chooses an outsourcing company in the same country
a. offshore nearshore
b. inshore onshore
Within the ___ technique for wireless security, a user’s computer and the AP use a master key to negotiate for
«key that will he used for a session,
a. BAP cc. WPA
b. WPA2 WEP
computing is a platform incorporating many recent technologies under one platform,
a Utility On-demand
b. Grid Cloud
introduced the value chain concept,
a Bill Gates Tim Berners-Lee
b. Tom Watson 4. Michael Porter
is an electronic version of a paper check
a. E-paper ©. E-check
b. E-cash d. E-wallet
‘The Internet started in__
a. 1950 © 1987
b. 1969 1994
|. Which term describes one user viewing one ad?
a. banner ad cli
b. ad view ad impression
Users interact via avatars in a(n)
a. virtual world telepresence system
}b. cloud computing environment RFID system
Data encryption transforms data into a serambled form called
a. ciphertext c.-message digest text
b. plaintext cleartext
An__ is available for most handheld devices.
a. e-paper e-wallet
b. e-cash d. e-check
Many organizations now follow the ___ model to form teams that ean handle network intrusions aud attacks
quickly and effectively
a. CERT ¢. The McCumber cube
b. CIRC d. Sarbanes-Oxley
‘The ___ component of an expert system is important because it helps give users confidence in the system's
results
a. meta-knowledge system © explanation facility
b. knowledge acquisition facility heuristic
systems have been one of the most successful AL related technologies.
a Expert MIS
b. Agent NLP
‘The amount of data that can be transferted frm one point to another in one second is called __
a. modem bandwidth
>. protocol attenvation
A database __, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval
a. definition ©. engine
b. system application
In the ___model, each record ean have multiple parents and multiple children
a. hierarchical ©. network
b. relational 4d. imtegrity
‘The intervention aspect of a(n)
situations that are inherently unsystematic and inefficient.
a EIS c. DSS
__ reduce communication barriers and introduce order and efficiency into246.
247,
248,
249.
4. GIs
‘The Internet has improved productivity in many organizations, but this improvement must he converted to
a exposure ¢. profitability
b. value cash flow
__ is a pure-play company.
3 BamesandNoble.com Walmart.com
b. Gap.com |. Amazon.com
Accessing one central database server could increase ___ for remote users.
a. communication costs ©. productivity
b. processing speed 4 enrorrates
The ___ document is created during the requirements-gathering and analysis phase.
a CBA ©. system specifications
b. JAD maintenance plan
A__ market concentrates on a specific function or business and automates this function or process for
different industries
a. horizontal © two-dimensional
b. verte targeted
Online brokerage firms operate in a highly competitive environment, so they use information technologies to
make their services more tnique in order to combat
a. supplier power &. ayer power
the threat of new entrants d._ rivalry among existing competitors
he ___modl brings sellers and buyers together on the Weh and collects commissions on transactions
between these parties
4. merchant advertising
b. brokerage mixed
In service organizations, the link in the supply chain include __
a. management c. software
b. hardware service providers
Intentional threats include
a. user’s accidental deletion of data © floods
b. power outages attacks by disgruntled employees
In a(n) ___file, each alphabetic, numeric, or special characteris represented with a 7-bit binary number.
a. EBCDIC © Unicode
b. ASCII extended ASCIT
AA company can purchase a(n) ___ package that might include services from different vendors, but the
e-distributor coordinates them into one package for customers.
4. supply chain management ¢. electronic data interchange
b._ enterprise resource planning 4d. maintenance, repair, and operations
___can be conducted (wired or guided) or radiated (wireless).
a. Communication media ¢. Communication networks
b. Attenuation a. Protocols
A decision support system is a(n) __ information system consisting of hardware, software, andl models
designed to assist decision makers in an organization
a. inferactive virtual
b. artificial static
Passive tags usually last longer than aetive tags; the best ones have about ___of battery life
a. 30 days 10 years
b. 1 year 20 years
In grid computing, each participant ina grid is referred to-as a
a. CAVE © node
b. cell dtag
Generally, __ laws protect tangible material, such as books and drawings,
a. logo trademark
b. patent . copyright
The final result of the economic feasibility study is the ___ report,
a. net present value payback
b. cost-benefit analysis internal rate of return
Sometimes an information system needs to be designed from scratch, and the __ mode! is particularly
suitable in these situations
a. RAD dataflow
b._ self-sourcing . SDLC
‘The ___operator searches for records that don’t meet the condition
a. MIS
ORrevision questions for exams
Answer Section
‘MULTIPLE CHOICE
ANS
CONOS ORS ONTO e SOAS ENBANTANBoANAASCSOONE EEO
DONND Oh POTD UO SP OE PONS DOSS NOS NT ON BPOTONOONSSE BOSE89.
90.
1
92
93
94.
95,
96.
98.
99.
100.
101
102.
103,
104.
10s.
106.
107.
los.
109,
Ho.
MM
112.
1.
Ma.
us.
116.
117.
118. AD
Lio.
120.
121.
122,
123.
124.
128.
126.
127.
128.
129.
130.
131
132,
133.
134.
ANS:
ANS.
ANS:
ANS:
ANS:
ANS:
ANS.
ANS:
ANS:
ANS:
ANS.
ANS
ANS:
ANS:
1. ANS:
ANS:
ANS:
ANS:
ANS:
ANS
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS
ANS:
ANS
ANS:
ANS:
ANS:
ANS:
. ANS:
ANS:
ANS:
ANS!
ANS:
ANS:
ANS:
ANS.
ANS:
ANS
ANS:
ANS.
ANS:
>noesnaseanvasnewSoen
>eOANUee>SorONOFoOoSooIONS
CONS OTAANANS SS BAe POON SONS POCA S SOP SOU
nasnsoeea
REF: 154
REF: 105
REF: 71
REF: 212
REF: 214
REF
REF
REF:
REF:
REF
REF:
REF
REE
REF:
REF.
REF:
REF:
REF
REF
REF:
REF
REF
REF:
REF:
REF: 236
REF: 203
REF: 154
REF: 29
REF: 197182.
183.
18a.
185.
186.
187.
18
139.
190.
19)
192.
193.
194.
19s.
196.
197.
198.
199.
200.
201
205.
206,
207,
208.
209,
210,
2
212.
213,
214,
215
216,
217.
218,
219,
20.
1
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS.
ANS:
ANS:
ANS:
ANS:
ANS:
ANS:
ANS
ANS
ANS.
ANS:
ANS:
ANS:
ANS:
pUnwoDoNOFOe
>eDOOmEES
vognasaess
oso
orn>sonag
anesorogmoEneoneann
noo
prs:
PTS:
PTS:
PIs:
PIS:
REF
REF:
REP:
REF:
REF:
REE
REF
REF:
REF
REF:
REF:
REE
REF
REF:
REF:
REF:
REF
REF
REF:
REF:
REF
REF
REF:
REF
REF
REF:
REE
REF
REF:
RE
REF
REF:
REF
REF:
REF:
REF
REF:
REF:
REF
REF
REF:
REF
REF
REF:
REF:
REF
REF.
REF:
REF:
REF
REF:
REF:
REE
REF:
REF:
REF
REF:
REF:
REF:
REF
REF:
REF:
REF:
REF:
REF
REF
REF:
REF.
REF
24
33
a2
203,
7)
88
241
253
26
21
204
237
120
81
233
35
212
100
186
1d
233,
137
153
68
2
260
142
153
ho
133
254
87
153
80
233
232
97
46
43
220
1
146
48
IL
Ist
4
Las
195
1
26
199
98
ald
256
258
67
180
176
a7