Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
65 views
11 pages
INF1505 ExamQuestions
INF1505
Uploaded by
madzhiedakalo6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save INF1505 ExamQuestions For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
65 views
11 pages
INF1505 ExamQuestions
INF1505
Uploaded by
madzhiedakalo6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save INF1505 ExamQuestions For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save INF1505 ExamQuestions For Later
You are on page 1
/ 11
Search
Fullscreen
revision questions for exams Multiple Choi Identify the choice that best completes the statement or answers the question. 1 __ media operate on line-of a Coaxial Terrestrial microwave b. Multipoint Fiber optic ‘Typically, are used only in large enterprises because of their cost and installation complex a. SANS ©. CD-ROMs b. NAS hard disks ___refers to the accuracy of information resources within an organization. a Availability © Confidentiality b. Integrity Security ___ technology uses special hardware and software to give users the feeling of being part of an environment = Tmmersion Interaction Simulation Telepresence data is information in its original form. a Summary Raw b. Open 4. Transformed A typical PDA includes a(n) __. a. external monitor © external keyboard b. mouse calendar A___ isan inexperienced, usually young hacker. a. black hat white hat b. wizard script kiddie In the __ phase, analysts define the problem and generate alternates for solving it a. requirements gathering and analysis c, design . implementation planning Using the ___ model transfers the old retail mode! to the e-commerce world by using the medium of the Internet. a. mixed ©. brokerage b. advertising merchant The decision maker defines associations between alternatives and criteria during the ___phase of the ecision-making process, a. intelligence b. implementation ‘The ___ component of a DSS coordinates the other components. a userinterface © DSSengine b. model base database The cost of industrial robots can range from ___and more a. $10,000 to $30,000 ‘$100,000 to $250,000 b. $50,000 to $100,000 «$500,000 to $1,000,000 ‘The term RAID stands for__ redundant access for independent devices b. random access for independent disks © redundant array of independent disks random array of independent drives, |. The __ topology is costly and difficult to maintain, 30. 34, 36, 40. 4 a bus star b. ring mesh components of a VR system enable users to see and hear the virtual world a. Manual navigation control bb. Visual and aural Walker 4d. Central coordinating processor and software system, Intelligent agents are also called a. moles bots b. rootkits rats is. social networking Web site a. Sony Music Group © Facebook b. XML d. Droid In the URL, htip//www.csub.edu/-hbidgoti/books.hunl, __ represents the name of a directory in which files are stored a. books.htsnl & wwwesubedu b. http .hbidgoli Which term refers tothe rate computed by dividing the mumber of clicks an ad gets y the total impressions bought? fa. cost per click rate(CPC) click-through rate (CTR) b. cost per thousand (CPM) d._cost per impression rate (CPD) TVs that adjust sereen color and texture for each frame and stabilize the volume based on the viewer's location inthe room are demonstrating personal agent qualities ©. fuzzy logic b. surveillance 4. atificial neural capabilities ___uses computer-generated, three-dimensional images to create the illusion of interaction in a real-world environment a WiFi Nanotechnology b. VR technology WiMAX refers to giving objects in a VR environment texture and shading for a 3-D appearance, Telepresence ©. Simulation Interaction Immersion is a Web-based personal financial management service that is an example of SaaS. Mint.com ©. Basecamp Salesforce.com Google Talk is the size of a character. a. nibble word b. byte a. bit Extensive training is one solution to the problem of __ feasibility. a. economic ©. technical b. schedule operational Cloud computing includes components in the form of ___as.a service (laaS) a. Intemet infrastructure b. investment information are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or Scholarly nature. a. Discussion groups IRC b. News groups d. E-mail groups How data is stored on and retrieved from a hard disk is the —_ view. physical ©. logical b. hard copy storage commerce fulfils the product information activity using a phone calls, ©. Web sites b. e-mail d. faxes The most common way to index and link databases is using a. names c. addresses b. Social Security numbers 4d. driver’s license numbers In the __, Matsushita in Japan built a viral kitchen that enabled customers to change fixtures and appliances ane alter the design on a computer and then virtually walk around the kitchen space. a. 1970s 1990s bb. 1980s a. 20005 ___ analysis is available in spreadsheet programs such as Microsoft Excel a What-is . Whatif b. Lookup . Cause-and-etfect One advantage of grid computing is ___. meaning that if one node on the grid fails, another node can take over. a parallel processing scalability b. improved reliability sharing Integrating ___ into the SDLC process is a good idea to ensure the system’s success. a checkpoints ©. operating costs b. intangible benefits A(n) RSS feed makes use of ___ to distribute Web content, a. HTML, c. Twitter b. XML podcasting Nanotechnology incorporates techniques that involve the structure and composition of materials on a. a. nanoframe © manobyte b. nanometer nanoscale Level | security involves __. a. front-end servers, corporate networks b. playsical secur back-end systems Anattack by a___ hacker might not be an actual threat to an organization's security system. a. black hat white hat b. wizard script kiddie ‘The problem of missing deadlines is common inthe information systems field, but designers can often ‘minimize this problem by using __ tools. a. dataflow €. project management b. CASE flowchart Record keeping, payroll, and simple inventory’ problems are examples of ___ tasks a. unstructured ©. structured b. automated semistructured ‘What is the first step in client/server communication? a. The server receives the que b. The results are formatted and displayed. c. The user ereates a query The client accepts a request.A.___ operation searches data ina table and retrieves records based on certain erteria a. find €. project b. join a. select ‘The main technology used in an exocentric environment is. a. 3D graphics ©. VRD b. HMD nanotechnology ‘The __is atthe center of the CPER process a. rete © supplier b. manufacturer 4. consumer ___ costs measure what you would miss by not having a system or feature. a Investment ©. Economic b. Opportunity 4. Operational Scheduling and assigning employees might be handled by ata) a. PIS ©. MEIS bh LIS a. FIS ____are generated by Web server software, record a user's actions on a Web site a Spam c. Viruses b. Log files a. Logins ____computer conferencing includes an audio Tink but has no video. a Desktop ©. Real-time b. Analog a. Video ‘A podcast as a specifie and is defined with an XML item wg a. DNS c. address . transaction ID d. URL TBM System 210 is an example of a___ generation computer. a. second ©. fourth b. third fifth ‘The ___ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews. a. Copyright Act of 1994 ¢. Fair Use Doctrine b. ACM Code of Ethies 4d. Digital Millennium Act The ___ component of a VR system is an input device that captures and records movements of the user's feet as the user walks or turns in different directions. 2. manual navigation control b. visual and aural ©. walker 4. central coordinating processor and software system memory, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation. a. Open Raw 'b. Secondary 4d. Replicated SOA advocates that core business functions and the dynamic functions that change all the time should be a eliminated magnified b. combined 4. decoupled A__ shows a process at more general level and is helpful for showing top management and the task force how a process works. conceptual use model ©. data flow diagram b @. flowchart ___is the opposite of buyer power a. Rivalry among existing competitors ‘The thread of substitute products b. Supplier power |. The threat of new entrants Data mining agents work with a. a. knowledge base data warehouse b. catalog filter Search engines use software called “crawlers”, “spiders” or ~ a. Web browsers ©. directories b. HTML, a bots Preparing a budget is an example of a(n) __ task a. unstructured ©. automated b. semistructured 4. structured A decision maker examines the organization's environment for conditions that need decisions during the phase of the decision-making process. a. implementation © intelligence b. choice d. design Network administrators use___ technology to have antivirus updates downloaded on employees ‘workstations automatic a. push pall b. SaaS ASP According to Symantec Corporation, in 2008 the number of computer viruses in existence exceeded one hundred thousand © million b. half million trillion Bluetooth can be used to create a__. a. LAN ©. PAN b. WAN d. MAN A Trojan program contains code intended to disrupt a computer, network, or Web site, and itis usually hidden ina(n) program a. popular rarely used b. operating system application attacks inundate a Web site or network with e-mails and other network traffic so that it becomes Overloaded and can’t handle legitimate trafic. a. Denial-of-service b. Identity theft During systems __a preliminary analysis of requirements is done first 4. implementation design b. planning requirements gathering and analysis Plant location isan strategic management ___ component of an organization. adhoe semistructured structured unstructured __ report nonexistent viruses and may cause panic. Virus hoaxes. Trojan programs Backdoors Worms During the design phase, the design involves selecting a specific platform such as Dell servers running Ubuntu Linas, ©. physical a. logical100. 101 102. 103. 107. 108, 110. 13. ents usually track and report on computer equipment and network systems to predict when a system failure might occur Fuzzy logic © Monitoring and surveillance Data mining Shopping and information ‘The main objective of ___ is to prevent purchases from suppliers that are not on the approved list of sellers and to eliminate the provessing costs of purchases, a. e-procurement e-business b. e-marketing 4. third-party exchange marketplaces ‘The most common n-tier architecture involves tiers. a two © four b. three d. five A__ protects new processes a. ademark. Pair Use Doctrine b. patent copyright ___ is understanding the role of information in generating and using business intelligence. 3. Taformation litera ©. Transaction processi b. Computer literacy dd. Management information systems A GIS includes __. which might show a river. 4. tines ©. points b. areas regions ‘You encrypt a message with yout private key and use an algorithm that hashes the message and creates a_ a. plaintext message private key bb. digital signature d._ message digest isatype of memory that must be accessed sequentially. RAID magnetic tape A(n) ___ database has the ability to represent more complex data relationships than a relational database. a. distributed data-driven b._clientéserver a. object-oriented Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are a. directories types of Internet connections b. search engines navigational tools Mobile commerce (m-commerce) is based on the __ protocol a. EAP ©. WEP b. WAP2 a. WaP Future progress in___ includes further development in natural language processing that should make information systemis easier to use a computer criminals © compater literacy b. artificial intelligence personal computing power CASE tools are most useful during the ___ phase of the SDL. a. design maintenance . implementation planning A cave automatic virtual environment (CAVE) is a viral environment consisting of a___-shaped room in which the walls are rear projection screens. a. estindrical ©. sphere b. honeycombedt cube ___ scaling refers to adding more workstations (clients). a Vertical c. Static b. Dynamic 4. Horizontal ‘The first expert system, called DENDRAL, was developed in the mid-___at St a. 1940s 1960s b. 1950s d. 1970s ‘means all market participants can trade atthe same price. ac Accessibility ¢.. Price transparency b. Return on investment Customer service WIMAX is based on the IEEE __ standard. a 802.110 ©. 802.1In b. 80211b 80216 are goals and objectives that decision makers establish in onder to achieve certain performance a. Intangible milestones © Governance rules b. Mission statements ). With __ technology, information is sent to users based on their previous inquiries, interests, or specifications. a agent push b. smartcard a pull A routing table lists —__ a. the IP address of the router b. nodes on a network ¢. the protocols that each node understands, the packets to be sent ___ is colleoting data from Web sites, usually for competitive intelligence. a phishing ©. Data warehousing b. Data harvesting 4. Web harvesting Research and development is an example of a(n) __ task 3 unstructured structured b. semistructured automated A decision support system is particularly useful during the ___ phase of the decision-making process, a. design ©. intelligence b. choice 4. implementation A(n)__works with the KBMS to ensure that the knowledge base is as up-to-date as possible a. explanation facility heuristic b. knowledge acquisition facility d._-meta-knowledge system WiMAX can theoretically go up to speeds of __ Mbps. a 12 & 40 b. 24 ad 128 Bluetooth 3.0 supports a theoretical speed of __Mbps. a 12 © a8 b. 24 a. 128 A __ is hardware device that allows several nodes to share one communication channel a. controller multiplexor b. router front-end processor An intranet server is placed __the DMZ. a. infrontof ontop of b. behind ain High-level languages represent the ___ generation of computer languages, third b. second fourth E-mail messages are sent using the ___ protocol. a. POP © b. HTTP 4. VoIP An example of ___ analysis involves entering a customer account number and having the system display the customer's current balance a. lookup. cause-and-effect be what-is d. whatif Ina bus topology, ___ are used at each end of the cable to absorb the signal a. stoppers ©. emilators b. terminators nodes ‘The end result of the ____phase should give users and top management a clear view of what the problem is and how the information system will solve the problem a desi planning b. prototyping requirements ‘Transaction data for a CRM system might be gathered using a abusiness plan ¢. grocery slore loyalty cards b. inventory numbers d. ARFID chip ‘The hest approach to control the proliferation of invalid and inconsistent data in corporate databases is controll gthe of data, a si © amount b. flow use A___ catalog displays product descriptions based on customers’ previous experiences and preferences, a. logical physical viral i nataral ‘The costs of a GSS implementation are high hecause the system includes many __ 4. communication lines © consultants b. users features A__is built-in to a system by its designer a. Togic bomb backdoor b. worm virus ‘The ___ layer of the OST model specifies the electrical connections hetween computers and the transmission medium, and defines the physical medium used for communication. physical data link b. session application software, which is more powerful than spreadsheet software, is capable of performing many types analysis on large amounts of data. a. Graphics ©. Presentation b. Word processing Financial planning ___uses multiple sources of information and provides multidimensional analysis, a. OLAP cc. SQL b. OLTP . QBE As part of the _____phuase, the team collects performance data and gathers information on whether the system is meeting its objectives by talking with users, customers, and other people affected by the new system. a. planning ¢. maintenance b. requirements gathering and analysis di, design ‘The supervisor program of an OS is called the __ a. job manager © resource allocaterMa. Ls. 19. 120. 121 124. 128. 129. 130. 133. 134, 139. 140. Mi b. data manager kernel A(n)__ system is used to coordinate operations, resources, and decision making between manufacturing prochiction, marketing, and human resources, a. CRM © Web portal b SCM ERP ___is/are a supporting activity inthe value chain. a. Logistics Operations b. Service 4. Technological development Resolving conflicts between to divisions is a tactical management ___ component of an organization a. structured © semistructured b. adhoc unstructured ‘The ___ acts asa liaison when building a DSS, a. model builder end users b. managerial designer technical designer ___ payment refers to money or script that is exchanged only electronically. a. Digital c. Intemet b. Autiomated Electronic ___ have been added to sports urable and improve their responsiveness, a. Nanometers REID tags b. Data gloves Nanomaterials, ___ divides each channel into six time slots, a Time Division Multiple Access (TDMA) b. Mobile Telephone Switching Offices (MTSOs) Transmission Control Protocol (TCP) 4d. Code Division Multiple Access (CDMA) ar, such as tennis and golf balls and tennis rackets, to make them more InfoH{ub.com is a(n) _ Web site. a. healthcare travel and tourism b. realestate education The Clipboard’s contents ate stored on a. ROM © RAM b. EPROM d. PROM A___attack typivally targets Internet servers a. worm social engineering b. logic bomb . denial-ot-service __RFID tags can be embeded in a sticker or under the skin (human or animal) a Active Passive b. Open . Intemal Grouping objects along with their attributes and methods into a class is called 4. inheritance ¢. distributed processing b. replication encapsulation A__ generates revenue from the fees charged for matching buyers and sellers, a. third-party exchange marketplace trading partner agreement bb. buyer-side marketplace d._seller-side marketplace Symmetric DSL usually has an upstream rate of _ Mbps, a 1S € b. 24 a ‘main function is to provide information on security incidents, ineluding information systems’ Vulnerabilities, viruses, and malicious programs. a. The McCumber cube's CERT’ b. CIRC's Sarbanes-Oxley Microsoft can be used to create and modify a database a. Excel Word b. PowerPoint Access, In backward chaining, the expert system starts with the ___ first. a. “else” © goal b. “if condition A(n) __ isa peripheral deviee for recording, storing, and retrieving information. a ALU disk drive b. motherboard bus js when end users develop their own information systems with litle or no formal assistance from the information systems team. a. Outsourcing ©. Self-sourcing b. Sourcing Insourcing With the ____model, users don’t need to be concerned with new software versions and compatibility problems because the ASP offers the most recent version of the software a. SaaS ©. CAVE b. RFID aVR Inthe Al field, __ engineers try to discover “rules of thumb” that enable computers to perform tasks usually handled by humans. a. knowledge © data b. computer systems ‘To begin designing a relational database, you must define the ___ structure by defining each table and the fields init a. logical ©. physical b. management security When multiple pieces of data are sent simultaneously, this is__ communication narrowband ©. Wide area bb. broadband dd. modular __isa site that facilitates C2C e-commerce. a Walmart Gap b. Amazon eBay ‘The __ is responsible for specifying data requirements, what models are needed, and how these models might be used a. managerial designer ©. technical designer bb. model builder a. end user ___ enables business partners fo send and receive information on business transactions. a EDI Supply chin b. ERP a SCM Information technologies include __ a internal data ©. Twitter bb. the four Ms d. RFID tags divides a project into smaller functions, and developers can't go on to the next phase until the current phase is finished, a XP © RAD157. 158. 159. 160. 161 162. 169. 170. 171 b. Agile d. IAD . The ___ component of a ERP system collects and analyzes relevant internal and external data and information, a. unified database © CRM b. supply chain 4. e-commerce Digitized maps and___ oriented databases are two major components of a GIS. a. linear © spatially b. hierarchical relational Microsoft Access is an example of the ____ component of an information system, a. external data © process b. database internal data IBM Freelance is an example of __ software. a. word processing presentation >. spreadsheet graphics A__ helps break down a complex process into simpler, more manageable, and more understandable subprocesses. a. data flow diagram conceptual use model b. context diagram 4. flowchart Any system connected to the Intermet running ___is subject to a denial of service attack. a. TLS © SSL. b. TCP «UDP In adata flow diagram, processes are indicated with a(n) a. rectangle © cele b. diamond arrow 1. In data communication, ___ refers to integrating voice, video, and data so that multimedia information can be used for decision making a telepresence ©. teleprocessing b. dynamic a. convergence One notably growing application of data communication and convergence is a. teleprocessing ©. centralization b. telepresenc convergence intelligence applications might be helpful in the future for handling qualitative decisions a Automated ©. Artificial b. Unsiruetured Structured ‘The Transmission Control Protocol (TCP) operates at the OSI model's _ layer. a physical ©. transport b. data tink 4. notwork Prototyping is usually done in four steps, the last of which is__. a. reviewing and evaluating the prototype c. developiig the prototype '. defining the intial requirements 4. revising the prototype |. Users access a DSS through the __ component. a. database c. DSS engine b. user interface model base Ain) ____ denotes the type of organization or country the address specifies, a TLD c. DNS b. URL a DP cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to forma light path through wire cables. a. Coaxial & Fiberoptie b. Copper line a. Twisted-pair cold be used to make sure people don’t vote more than once. a Nanotechnology c. REID tags b. Biometrics Utility computing ___ RFID tags have no internal power supply a. Passive ©. Active b. Internal Closed A___ plan lists the tasks that must be performed to restore damaged data and equipment. a. disaster recovery risk assessment b. business continuity security compliance Hackers often use phishing to information, a. extort delete >. intercept modify Ina supply chain, flow to the supplier a. manufacturing maw materials b. customers consumers AA database is collection of related that can be stored! in a central location or in multiple locations. a indices c. data b. keys arrays LANs are used most often to__. a. link computers that are geographically far apart bb. provide wireless networking services inlegrate services, such as e-mail and file sharing 4. provide Internet service to cellular phones including smuutphones Crisis response is an example of a___ e-government application, a G2B ©. G2G b. GC d. G2E Input devices send data and information to a(n) a. vacuum tube computer b. CPU case ALU __is a common interorganizational system (10S), a RSS feed «2 b. Web 2.0 a. EDI ‘The __ approach to setting up a distributed database addresses how tables are divided among multiple locaiions, a. data-driven . allocation b. 4d. fragmentation AGIS i ‘which might show the location of an airport a. points . regions b. areas lines ‘The idea of the value chain was developed in a. 1975 1985 b. 1980 1990 With __. you request data from a database by constructing a statement made up of query forms, a. the database engine structured query language b. query by example select Distributing data among multiple sites minimizes the effects of computera fragmentation ¢. encapsulation b. replication failures 172. Generally, managers perform six tasks for which an EIS is useful. One of these is a. tracking inventory © working in groups, b. communicating via videoconferencing —d. spotting trends, 173. A___isa computer and all software for managing network resources and offering services to 4 network a. NAS server b. SAN . RAID 174, RFID tags have been decreasing in price and are currently less than __per tag. a. Scents Scents b. 10 cents dU dollar 175. Al technologies apply __to areas that require knowledge, perception, reasoning, understanding and cognitive abilities, a. user requirements ©. strategies b. computers manual processes 176. A___ operation pares down a table by eliminating columns (fields) according to certain criteria a. select © join bb. project find 177. Intelligent agents demonstrate ___ the capability to select problems or situations that need attention and act om them. a. reactivity adaptability b. collaborative behavior a. mobility 178. Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing habits: this is an example of a. customization © personalization b. customer relationship management supply chain management 179. aims) at inereasing a Web site's performance on seateh engines in a natural (and free) fashion. a SEO ¢. Micropayments b. XML Meta t 180. CD-ROMs and DVDs are examples of __ disks. a. tape © optical b. flash a. magnetic 181. Using the Intemet and Web protocols for EDI lowers the cost of __ documents a. reviewing transmitting b. creating storing 182. Transistors were the major technology for the __ generation of hardware. a. first © third b. second fourth 183. Using __ software, you can perform “what if” analysis on data. a. word processing ©. graphies b. kemel spreadsheet 184, With the __ records can be accessed sequentially or randomly, depending on the number being accessed. a. indexed sequential access method ©. hypercube structure bb. random access structure sequential file structure Organizations with an established IT infrastructure often choose a(n) _ CRM, which is implemented much like any other IT system, a. local distant b. Web-based on-premise 186. A__ travels from computer to computer, in a network, but it doesn’t usually erase data a. Trojan program worm b. virus backdoor 187. In____ encryption, the same key is used to encrypt and decrypt the message. a. nonrepudiation © asymmeitic b. TLS symmetric 188. .was developed so that users could communicate with computers in their own langu: a. ANN c. Virtual catalog technology b. Personal agent technology NLP 189, One major obstacle to using VR technology is that not eno are currently available a. computers & manomate b. educated users fiber optic cables 190, ASCII defines up to___ characters a8 258 b. 128 1024 191 perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs, a Natural language processors ©. Robots b. Neural networks d._ Knowledge bases 192. searches for specific information or patterns, using input from multiple business partners and data Sources, a. Knowledge management ©. Personalization b. Collaborative filtering Customization 193. Shopping and ___agents help users navigate through the vast resources available on the Web. a. information © open-source: b. lookup public 194, The first generation of computer languages consists of a series of ___ representing data or instructions a Is ©. macros b. Os d. Osand Is 195. The embedded references in hypermedia documents are called c. hyperareas b text media 196. ___ security measures use a physiological element to enhance security measures, a Social engineering Alternative b. Biometric 4. Biofeedback 197. __consists of rules related to a problem or discipline. a Expert knowledge ©. Factual knowledge b. Heuristic knowledge d. Meta-knowledge 198, Java and C++ are __ computer la ‘a fourth generation assembly b. fifth generation high-level 199, Mergers area strategie management __ component of an organization a. unstructured ©. structured b. adhoc semistructured 200, Spamming has created __ concerns, because the e-mails often contain explicit language or mudity a. privacy © sniffing b. decency fraud 201, The most widely used input device isthe a. keyboard touch sereenb. MICR d. mouse . _offers & 3-D virtual reality platform. 219. 220, 221, 200. 228, i Active Worlds ©. Habbo b. Second Lift Runescape 08s allow several users to use computer resources simultaneously. a. Hierarchical ©. Web-driven b. Kernel d. Time-shared ‘The most common data model is the _ model a. relational ¢._ hierarchical b. object-oriented network A(n) __ isthe link between devices connected to the computer a. logic unit ©. contrat unit b. bus a ALU layer of the OSI model generates the receiver's address and ensures the int sure packets are delivered without error, in sequence, and with no loss ord entation © transport application session In___conversion, the old and new systems run simultaneously for a shor time to ensure thatthe new system ‘works correctly a. phased-in-phased-out ©. plunge b. parallel a. pilot A(n) __ is atype of Web site that allows users to add, delete, and sometimes modify content a. blog wiki bh. RSS feed 4. ‘social networking site In an expert system, a(n) ___engine is similar to the model base component of a decision support system, a. factual ©. inference b. explanation a. knowledge ‘The Internet? (I2) project started in 1987 and has been planned as a(n) _ network a. open-source centralized b. static ___is a popular on-line payment system used in many on-line auction sites, a Smart card cc. Eash b. E-wallet a PayPal is registering, selling, or using a domain name to profit ftom someone else's trademark a The Unfair Use Doctrine ©. Cyberbullying b. The digital divide Cybersquatting ___robots have limited mobility, limited vision, and some speech capabilities. a. Industrial © Al b. Toy Personal AGIS uses___data. a. spatial and monspatial ©. regional buffered a relative With ___ outsourcing, the organization chooses an outsourcing company in the same country a. offshore nearshore b. inshore onshore Within the ___ technique for wireless security, a user’s computer and the AP use a master key to negotiate for «key that will he used for a session, a. BAP cc. WPA b. WPA2 WEP computing is a platform incorporating many recent technologies under one platform, a Utility On-demand b. Grid Cloud introduced the value chain concept, a Bill Gates Tim Berners-Lee b. Tom Watson 4. Michael Porter is an electronic version of a paper check a. E-paper ©. E-check b. E-cash d. E-wallet ‘The Internet started in__ a. 1950 © 1987 b. 1969 1994 |. Which term describes one user viewing one ad? a. banner ad cli b. ad view ad impression Users interact via avatars in a(n) a. virtual world telepresence system }b. cloud computing environment RFID system Data encryption transforms data into a serambled form called a. ciphertext c.-message digest text b. plaintext cleartext An__ is available for most handheld devices. a. e-paper e-wallet b. e-cash d. e-check Many organizations now follow the ___ model to form teams that ean handle network intrusions aud attacks quickly and effectively a. CERT ¢. The McCumber cube b. CIRC d. Sarbanes-Oxley ‘The ___ component of an expert system is important because it helps give users confidence in the system's results a. meta-knowledge system © explanation facility b. knowledge acquisition facility heuristic systems have been one of the most successful AL related technologies. a Expert MIS b. Agent NLP ‘The amount of data that can be transferted frm one point to another in one second is called __ a. modem bandwidth >. protocol attenvation A database __, the heart of DBMS software, is responsible for data storage, manipulation, and retrieval a. definition ©. engine b. system application In the ___model, each record ean have multiple parents and multiple children a. hierarchical ©. network b. relational 4d. imtegrity ‘The intervention aspect of a(n) situations that are inherently unsystematic and inefficient. a EIS c. DSS __ reduce communication barriers and introduce order and efficiency into246. 247, 248, 249. 4. GIs ‘The Internet has improved productivity in many organizations, but this improvement must he converted to a exposure ¢. profitability b. value cash flow __ is a pure-play company. 3 BamesandNoble.com Walmart.com b. Gap.com |. Amazon.com Accessing one central database server could increase ___ for remote users. a. communication costs ©. productivity b. processing speed 4 enrorrates The ___ document is created during the requirements-gathering and analysis phase. a CBA ©. system specifications b. JAD maintenance plan A__ market concentrates on a specific function or business and automates this function or process for different industries a. horizontal © two-dimensional b. verte targeted Online brokerage firms operate in a highly competitive environment, so they use information technologies to make their services more tnique in order to combat a. supplier power &. ayer power the threat of new entrants d._ rivalry among existing competitors he ___modl brings sellers and buyers together on the Weh and collects commissions on transactions between these parties 4. merchant advertising b. brokerage mixed In service organizations, the link in the supply chain include __ a. management c. software b. hardware service providers Intentional threats include a. user’s accidental deletion of data © floods b. power outages attacks by disgruntled employees In a(n) ___file, each alphabetic, numeric, or special characteris represented with a 7-bit binary number. a. EBCDIC © Unicode b. ASCII extended ASCIT AA company can purchase a(n) ___ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers. 4. supply chain management ¢. electronic data interchange b._ enterprise resource planning 4d. maintenance, repair, and operations ___can be conducted (wired or guided) or radiated (wireless). a. Communication media ¢. Communication networks b. Attenuation a. Protocols A decision support system is a(n) __ information system consisting of hardware, software, andl models designed to assist decision makers in an organization a. inferactive virtual b. artificial static Passive tags usually last longer than aetive tags; the best ones have about ___of battery life a. 30 days 10 years b. 1 year 20 years In grid computing, each participant ina grid is referred to-as a a. CAVE © node b. cell dtag Generally, __ laws protect tangible material, such as books and drawings, a. logo trademark b. patent . copyright The final result of the economic feasibility study is the ___ report, a. net present value payback b. cost-benefit analysis internal rate of return Sometimes an information system needs to be designed from scratch, and the __ mode! is particularly suitable in these situations a. RAD dataflow b._ self-sourcing . SDLC ‘The ___operator searches for records that don’t meet the condition a. MIS ORrevision questions for exams Answer Section ‘MULTIPLE CHOICE ANS CONOS ORS ONTO e SOAS ENBANTANBoANAASCSOONE EEO DONND Oh POTD UO SP OE PONS DOSS NOS NT ON BPOTONOONSSE BOSE89. 90. 1 92 93 94. 95, 96. 98. 99. 100. 101 102. 103, 104. 10s. 106. 107. los. 109, Ho. MM 112. 1. Ma. us. 116. 117. 118. AD Lio. 120. 121. 122, 123. 124. 128. 126. 127. 128. 129. 130. 131 132, 133. 134. ANS: ANS. ANS: ANS: ANS: ANS: ANS. ANS: ANS: ANS: ANS. ANS ANS: ANS: 1. ANS: ANS: ANS: ANS: ANS: ANS ANS: ANS: ANS: ANS: ANS: ANS: ANS ANS: ANS ANS: ANS: ANS: ANS: . ANS: ANS: ANS: ANS! ANS: ANS: ANS: ANS. ANS: ANS ANS: ANS. ANS: >noesnaseanvasnewSoen >eOANUee>SorONOFoOoSooIONS CONS OTAANANS SS BAe POON SONS POCA S SOP SOU nasnsoeea REF: 154 REF: 105 REF: 71 REF: 212 REF: 214 REF REF REF: REF: REF REF: REF REE REF: REF. REF: REF: REF REF REF: REF REF REF: REF: REF: 236 REF: 203 REF: 154 REF: 29 REF: 197182. 183. 18a. 185. 186. 187. 18 139. 190. 19) 192. 193. 194. 19s. 196. 197. 198. 199. 200. 201 205. 206, 207, 208. 209, 210, 2 212. 213, 214, 215 216, 217. 218, 219, 20. 1 ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS. ANS: ANS: ANS: ANS: ANS: ANS: ANS ANS ANS. ANS: ANS: ANS: ANS: pUnwoDoNOFOe >eDOOmEES vognasaess oso orn>sonag anesorogmoEneoneann noo prs: PTS: PTS: PIs: PIS: REF REF: REP: REF: REF: REE REF REF: REF REF: REF: REE REF REF: REF: REF: REF REF REF: REF: REF REF REF: REF REF REF: REE REF REF: RE REF REF: REF REF: REF: REF REF: REF: REF REF REF: REF REF REF: REF: REF REF. REF: REF: REF REF: REF: REE REF: REF: REF REF: REF: REF: REF REF: REF: REF: REF: REF REF REF: REF. REF 24 33 a2 203, 7) 88 241 253 26 21 204 237 120 81 233 35 212 100 186 1d 233, 137 153 68 2 260 142 153 ho 133 254 87 153 80 233 232 97 46 43 220 1 146 48 IL Ist 4 Las 195 1 26 199 98 ald 256 258 67 180 176 a7
You might also like
887 Most Important Question of Hartron Deo
PDF
No ratings yet
887 Most Important Question of Hartron Deo
143 pages
Assistant Information and Communication Technology II
PDF
No ratings yet
Assistant Information and Communication Technology II
14 pages
Software Engineering MCQ 2 Final With Answers
PDF
100% (1)
Software Engineering MCQ 2 Final With Answers
18 pages
Ch4 System
PDF
100% (1)
Ch4 System
13 pages
INF1505 Exam Questions
PDF
No ratings yet
INF1505 Exam Questions
32 pages
IGCSE ICT MCQ Mock 1 - Full
PDF
100% (4)
IGCSE ICT MCQ Mock 1 - Full
4 pages
(UPDATED 18-SEP-2024) Dynamic Website Development Using PHP-7062
PDF
100% (1)
(UPDATED 18-SEP-2024) Dynamic Website Development Using PHP-7062
8 pages
Compiled Quizzes
PDF
No ratings yet
Compiled Quizzes
15 pages
Multiple Choice Questions: Best Problems and Solutions
PDF
No ratings yet
Multiple Choice Questions: Best Problems and Solutions
5 pages
Relational Data Model and ER/EER-to-Relational Mapping
PDF
100% (1)
Relational Data Model and ER/EER-to-Relational Mapping
85 pages
Computing and Communication Resources Multiple Choice Questions
PDF
100% (2)
Computing and Communication Resources Multiple Choice Questions
44 pages
Ict 2020
PDF
No ratings yet
Ict 2020
10 pages
Information - Systems - Development Exam
PDF
100% (1)
Information - Systems - Development Exam
6 pages
Se204 Finals
PDF
No ratings yet
Se204 Finals
11 pages
Multiple Choice Questions: Best Problems and Solutions
PDF
No ratings yet
Multiple Choice Questions: Best Problems and Solutions
6 pages
Inf1505 2019 6 e 1
PDF
No ratings yet
Inf1505 2019 6 e 1
17 pages
Living in The IT Era: East West Mindanao College Inc
PDF
No ratings yet
Living in The IT Era: East West Mindanao College Inc
6 pages
BIT 4205 - Network Programming - Updated - Complete Notes
PDF
100% (1)
BIT 4205 - Network Programming - Updated - Complete Notes
99 pages
Test Bank Chapter 9
PDF
100% (2)
Test Bank Chapter 9
47 pages
Software Engineering
PDF
No ratings yet
Software Engineering
44 pages
T.Y.B.Sc. It Sem Vi SIC MCQ-Unit-2
PDF
100% (1)
T.Y.B.Sc. It Sem Vi SIC MCQ-Unit-2
5 pages
Richfield Graduate Institute of Technology (Pty) LTD Higher Education and Training Faculty of Information Technology Programming 732 (Practical)
PDF
0% (1)
Richfield Graduate Institute of Technology (Pty) LTD Higher Education and Training Faculty of Information Technology Programming 732 (Practical)
3 pages
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
PDF
100% (1)
Transport Layer - Computer Networks Questions & Answers - Sanfoundry
4 pages
DBMS MCQs - Chapterwise Database Management Multiple Choice Questions and Answers
PDF
50% (2)
DBMS MCQs - Chapterwise Database Management Multiple Choice Questions and Answers
6 pages
Outsourcing Security Case Study
PDF
No ratings yet
Outsourcing Security Case Study
13 pages
Internal Memory - 1
PDF
No ratings yet
Internal Memory - 1
12 pages
Chapter 13 Systems Analysis and Design: Computers Are Your Future, 10e (Coyle)
PDF
No ratings yet
Chapter 13 Systems Analysis and Design: Computers Are Your Future, 10e (Coyle)
25 pages
End Term Practice Pev107 1
PDF
No ratings yet
End Term Practice Pev107 1
139 pages
Information Management 2
PDF
No ratings yet
Information Management 2
111 pages
Inf1505 May June 2018 Memo
PDF
No ratings yet
Inf1505 May June 2018 Memo
20 pages
Enterprise Java Unit 5
PDF
No ratings yet
Enterprise Java Unit 5
10 pages
تجميعات الاسئلة السايبر
PDF
No ratings yet
تجميعات الاسئلة السايبر
80 pages
COS3751 Nov 2022 Exams
PDF
No ratings yet
COS3751 Nov 2022 Exams
8 pages
Info Security Quiz 2
PDF
No ratings yet
Info Security Quiz 2
4 pages
Chapter 04: Risk Management True/False
PDF
No ratings yet
Chapter 04: Risk Management True/False
14 pages
Information Assurance Test
PDF
No ratings yet
Information Assurance Test
4 pages
Chapter 12
PDF
No ratings yet
Chapter 12
31 pages
Dbms Objective Bits
PDF
No ratings yet
Dbms Objective Bits
92 pages
Database Managment System
PDF
No ratings yet
Database Managment System
18 pages
BSCS 4th (Database System)
PDF
No ratings yet
BSCS 4th (Database System)
4 pages
Lab04-Aggregate Functions, Group By, Numeric and String Functions
PDF
No ratings yet
Lab04-Aggregate Functions, Group By, Numeric and String Functions
8 pages
DIT 3 Year 1st Years
PDF
0% (1)
DIT 3 Year 1st Years
24 pages
PDC Example Exam Questions
PDF
No ratings yet
PDC Example Exam Questions
9 pages
Infs213 Pasco
PDF
No ratings yet
Infs213 Pasco
11 pages
BS It Uoe Pak
PDF
No ratings yet
BS It Uoe Pak
68 pages
Business Computing Quiz (Part 3)
PDF
No ratings yet
Business Computing Quiz (Part 3)
8 pages
Human Computer Interaction Quiz Questions
PDF
No ratings yet
Human Computer Interaction Quiz Questions
9 pages
DBMS Self Notes CHP 1
PDF
No ratings yet
DBMS Self Notes CHP 1
7 pages
HCI-Lecture-14 - 15
PDF
No ratings yet
HCI-Lecture-14 - 15
94 pages
10-FDs & Normalization in DBMS - Print - Quizizz
PDF
No ratings yet
10-FDs & Normalization in DBMS - Print - Quizizz
5 pages
INFS1602 Testbank Chapter 5 (Part 1)
PDF
No ratings yet
INFS1602 Testbank Chapter 5 (Part 1)
14 pages
Cs2301 Software Engineering Questionbank
PDF
100% (1)
Cs2301 Software Engineering Questionbank
43 pages
Oracle Technical Questions
PDF
No ratings yet
Oracle Technical Questions
14 pages
Introduction To ICT MCQ Exercise - CH20
PDF
No ratings yet
Introduction To ICT MCQ Exercise - CH20
2 pages
Enterprise Resource and Planning - ERP
PDF
No ratings yet
Enterprise Resource and Planning - ERP
20 pages
Aspire Set of Questions
PDF
No ratings yet
Aspire Set of Questions
21 pages
Chapter 2
PDF
100% (2)
Chapter 2
4 pages
Compe 431 Sample Questions
PDF
100% (1)
Compe 431 Sample Questions
19 pages
CSC207
PDF
No ratings yet
CSC207
14 pages
INFO 101 Reviewing Quiz 3 (Lectures 7-8-9) : Student Name: - Student ID
PDF
No ratings yet
INFO 101 Reviewing Quiz 3 (Lectures 7-8-9) : Student Name: - Student ID
3 pages