Quiz 1 Ca51013 - It App

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

QUIZ 1 CA51013 - IT APP

1. Online classified ads are an example of C2C e-commerce.

True
False

2. Which of the following is an example of green computing?

a. Purchase and use products with an ENERGY STAR label.


b. Keep devices turned on and ready to use, even at night.
c. Request printed receipts.
d. Purchase new models of devices as soon as they are released.

3. Which of the following types of websites typically provides the least security?
a. online banking sites
b. online shopping sites
c. social media sites
d. social media sites

4. The factor conceptually distinguishes external auditing and internal auditing


a. tests of controls
b. substantive tests
c. constituent
d. degree

5. New cars use embedded computers to make driving safer.

True
False

6. How are delivery drivers able to meet the delivery timelines selected by customers when
purchasing products?

a. They have automated vehicles


b. They use a GPS to avoid traffic delays
c. They have self-driving trucks
d. They use handheld computers/ scanners

7. Creating or copying files from a computer's hard drive and storing them in a remote
location.

nam
a. uninterruptible data supply
b. private copy
c. alarm
d. data backup

8. What types of activities are ideal for a robot to perform?

a. Critical thinking
b. Creative design work
c. Group interaction
d. Repetitive tasks

9. When designing the data collection activity, which type of data should be avoided?

a. Data that is relevant


b. Data that is efficient
c. Data that is redundant
d. Data that is accurate

10. An appraisal function housed within the organization that performs a wide range of
services for management is

a. Internal auditing
b. Data control group
c. External auditing
d. Database administration

11. Subsystem of the accounting information system

a. Management reporting system


b. Management information system
c. Expert system
d. Value chain system

12. Which of the statements about B2B e-commerce is correct?

a. Examples of B2B services are advertising, technical support, and training


b. the end consumer is the decision-maker in the transactions.
c. B2B websites offer fixed, consistent pricing for all purchases
d. shopping websites use B2B e-commerce

13. Why do companies use online collaborative productivity software?

nam
a. to promote company events and products
b. to allow employees to share, edit, and comment on documents
c. to take classes or earn a degree online
d. to perform work that is too dangerous, detailed, or monotonous for a single person

14. Information lacking reliability may still have value.

True
False

15. Custom software is developed and maintained by enterprise resource planners.

True
False

16. Under SOX legislation public accounting firms are no longer allowed to provide
consulting services to audit clients.

True
False

17. Your Facebook profile is private so there is no need to worry about your boss ever seeing
your posts such as your get away pictures.

True
False

18. A complete set of attributes for a single occurrence of an entity class.

a. Key
b. File
c. Record
d. Character

19. Conrad just received a letter from his health care provider telling him he can create an
account online that will give him access to all his health records. How would you
describe what his provider is encouraging his patients to engage with?

a. A learning management system (LMS)


b. An intelligent workplace
c. A BYOD (bring your own device)
d. A mobile health app (mHealth)

nam
20. After Sarah broke up with her boyfriend, he texted some teammates from the track team
about some private and intimate moments he and Sarah had shared while they were
dating. He even lied about their breakup, creating rumors about her behavior. Sarah
started getting inappropriate looks and advances from the team whenever she was at
practice and felt completely humiliated. Sarah is a victim of?

a. Cyberstalking
b. Cyberbullying
c. Social engineering
d. Data mining

21. Attestation services are performed by

a. External auditors
b. Internal accountants
c. Internal auditors
d. Third-party accountants

22. The goal of data processing is

a. The verification of the algorithms used


b. To collect only relevant data
c. The production of useful information
d. To develop a hierarchy of outputs

23. An accounting function?

a. distributing transaction information to operations personnel


b. managing the physical information system on the firm
c. portfolio management
d. materials management

24. Custom software is the most affordable systems development option.

True
False

25. To protect your information and help you to remember passwords, use your social media
account login information to log into another site.

True
False

nam
26. An example of a nonfinancial transaction is

a. Sale of products
b. Cash disbursements
c. Log of customer calls
d. Purchase of inventory

27. How will you decide which browser security settings to allow and which ones to block?
If the browser security setting is from my favorite online retailers, I will accept it because
the retailer knows what I like.

a. I will need to review each browser security setting and use my best judgment.
b. If the browser security setting is on a website sent from a friend, I always accept the
setting.
c. If the browser security setting has been mentioned on several friends' timelines on
Facebook then
d. it must be a good one, so I should do change it on my computer too.

28. The most basic element of useful data in the database is the

a. Record
b. Key
c. File
d. Attribute

29. What technology can collect information to make decisions, reach conclusions, and
combine information in new ways?

a. Robotics
b. Artificial Intelligence (AI)
c. Virtual Reality (VR)
d. Embedded computers

30. Erika has recently opened a Facebook account and as a new user, is posting frequently
and accepting many friend requests. You see a post about an upcoming trip and notice
that her profile is open to the public. What can you tell Erika to help her use social
networking safely?

a. Be cautious about what information she posts


b. Allow anyone who “friends” her to view her information
c. Post all types of photos more often

nam
d. Ignore notices from the social networking site about changes to security

31. In the 1980s movie, Wargames, the computer was taught to play chess, checkers, tic tac
toe, and other strategy games. How would you describe the developers' goal in teaching
the computer these game

a. The developers were creating virtual reality


b. The developers were exploring the use of embedded computers
c. The developers were on the verge of discovering augmented reality
d. The developers were using artificial intelligence

32. The term "accounting independence" refers to

a. Data integrity
b. Segregation of duties
c. Generation of a timely information
d. Business segmentation of function

33. A balance sheet prepared in conformity with GAAP is an example of discretionary


reporting.

True
False

34. Rica is used to buying clothes from physical stores. Her friend, Teresa, prefers online
shopping and wants to persuade her to shop online as well. Which of the following
arguments can Teresa make to convince Rica without painting a false picture?

a. E-commerce websites are more secure than physical shops.


b. There is no difference between physically verifying the quality of a product and doing
it online.
c. You can shop online at any time of day and in any weather conditions.
d. Some physical stores are designed to look legitimate but are actually fraudulent.

35. The management reporting system provides the internal financial information needed to
manage a business.

True
False

36. Reece saw a computer named Rohn on the game show Jeopardy and was surprised at
how many answers Rohn was able to get correct, especially because the math problems
involved solving equations. Rohn was using augmented reality to solve the problems.

nam
True
False

37. The internal auditor represents the interests of third-party outsiders.

True
False

38. Peripheral devices, like a USB flash drive, are generally connected to your computer
through ports.

True
False

39. An internal audit department's independence is compromised when the department


reports to

a. the company controller


b. the audit committee
c. both the controller and audit committee
d. neither the controller nor audit committee

40. Which of the following is a business resource?

a. Raw material
b. Labor
c. Information
d. All are business resources

41. In the distributed data processing approach

a. computer services are consolidated and managed as a shared organization


resource
b. the computer service function is a cost center

nam
c. the end users are billed using a charge-back system
d. computer services are organized into small information processing units under the
control of end users

42. Mike recently sold his old laptop directly to a student from different college using an e-
commerce website. The website he used runs on B2B model.

True
False

43. Akira has a mobility impairment that makes it difficult to type on a keyboard. What
technology can she use to create written documents without using a keyboard?

a. closed captioning
b. speech recognition software
c. braille printer
d. tablet

44. You are on vacation and want to see where all the restaurants and trendy shops are in
relation to your hotel. You remember there is an app on your phone that will use your
location and show you that information. What is the app using?

a. Chip-and-pin technology
b. Augmented reality
c. Kiosk
d. Digital literacy

45. Aerys and Stephen have heard how beautiful the Swiss Alps are, but they are afraid to
fly. What technology could they use to see and experience the Alps without flying there?

a. Robotics
b. Embedded sensors
c. Virtual reality
d. AI

46. Your school has just been awarded a technology grant. Each year level team has been
asked to submit a proposal for how they would could use the money. Your team puts
forward an idea where students can submit work online and work collaboratively with on
projects. What type of classroom have you described?

A. Information classroom
B. Technology classroom
C. Mobile classroom

nam
D. Intelligent classroom

47. If you want to become a digital citizen, you only have to buy a piece of technology.

True
False

48. IT professionals create custom software using

a. Distributed data processing


b. Turnkey systems
c. Enterprise resource planning
d. The system development life cycle

49. In a web app, where is data usually stored?

a. Mobile network
b. Application storage
c. Local computer
d. Cloud storage

50. Aberei needs a convenient way to browse the Internet, read emails, and store basic data
when she travels. Which of the following would be the best option for her?

a. all-in-one computer
b. desktop computer
c. tablet
d. high-end laptop

nam

You might also like