System Test 2

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

  • 8/2/2019 System Test 2

    1/29

    Circuit switching makes much more efficient use of the communications capacity of a network than

    does packet switching.

    TrueFalse

    2. (Points: 1.0)

    A protocol is a standard set of rules and procedures for the control of communications in a network.

    TrueFalse

    3. (Points: 1.0)

    Two computers using TCP/IP can communicate even if they are based on different hardware and

    software platforms.

    TrueFalse

    4. (Points: 1.0)

    In a ring topology, one station transmits signals, which travel in both directions along a single

    transmission segment.

    TrueFalse

    5. (Points: 1.0)

    Which type of network treats all processors equally, and allows peripheral devices to be shared

    without going to a separate server?

    a. peer-to-peer

    b. wireless

    c. LAN

    d. ring

  • 8/2/2019 System Test 2

    2/29

    6. (Points: 1.0)

    Which type of network would be most appropriate for a business that comprised three employees

    and a manager located in the same office space, whose primary need is to share documents?

    a. wireless network in infrastructure mode

    b. domain-based LAN

    c. campus area network

    d. peer-to-peer network

    7. (Points: 1.0)

    In a bus network

    a. signals are broadcast in both directions to the entire network.

    b. signals are broadcast to the next station.

    c. multiple hubs are organized in a hierarchy.

    d. messages pass from computer to computer in a loop.

    NIGHT O(297304523) 17:33:49

    8. (Points: 1.0)

    Web 2.0 is the collaborative effort led by the World Wide Web Consortium to add a layer of

    meaning atop the existing Web to reduce the amount of human involvement in searching for and

    processing Web information.

    TrueFalse

    9. (Points: 1.0)

  • 8/2/2019 System Test 2

    3/29

    Wi-Fi enables users to freely roam from hotspot to hotspot even if the hotspot is using different Wi-

    Fi network services.

    TrueFalse

    10. (Points: 1.0)

    The most common Ethernet topology is

    a. ring.

    b. star.

    c. bus

    d. mesh.

    11. (Points: 1.0)

    A network that spans a city, and sometimes its major suburbs as well, is called a

    a. CAN.

    b. MAN.

    c. WAN.

    d. LAN.

    12. (Points: 1.0)

    Bandwidth is the

    a. number of frequencies that can be broadcast through a medium.

    b. number of cycles per second that can be sent through a medium.

  • 8/2/2019 System Test 2

    4/29

    c. difference between the highest and lowest frequencies that can be accommodated on a single

    channel.

    d. total number of bytes that can be sent through a medium per second.

    13. (Points: 1.0)

    The total amount of digital information that can be transmitted through any telecommunications

    medium is measured in

    a. bps.

    b. Hertz.

    c. baud.

    d. gigaflops.

    14. (Points: 1.0)

    Digital subscriber lines

    a. operate over coaxial lines to deliver Internet access.

    b. are very-high-speed data lines typically leased from long-distance telephone companies.

    c. have up to twenty-four 64-Kbps channels.

    d. operate over existing telephone lines to carry voice, data, and video.

    15. (Points: 1.0)

    What service converts IP addresses into more recognizable alphanumeric names?

    a. HTML

    b. DNS

  • 8/2/2019 System Test 2

    5/29

    c. IP

    d. HTTP

    NIGHT O(297304523) 17:34:54

    16. (Points: 1.0)

    The child domain of the root is the

    a. top-level domain.

    b. second-level domain.

    c. host name.

    d. domain extension.

    17. (Points: 1.0)

    In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and

    third-level domains, respectively?

    a. "http://", myspace, blogging, com

    b. "http://", com, blogging, myspace

    c. ".", myspace, blogging, com

    d. ".", com, blogging, myspace

    18

    .

    (Points: 1.0)

    Which of the following services enables logging on to one computer system and working onanother?

    a. FTP

    b. LISTSERV

  • 8/2/2019 System Test 2

    6/29

    c. Telnet

    d. World Wide Web

    19

    .

    (Points: 1.0)

    A VPN

    a. is an encrypted private network configured within a public network.

    b. is more expensive than a dedicated network.

    c. provides secure, encrypted communications using Telnet.

    d. is an Internet-based service for delivering voice communications.

    20

    .

    (Points: 1.0)

    What technology allows people to have content pulled from Web sites and fed automatically totheir computers?

    a. FTP

    b. RSS

    c. HTTP

    d. Bluetooth

    21

    .

    (Points: 1.0)

    A network that connects authorized customers, suppliers, and other business partners toportions of a firm's internal network is called a(n)

    a. intranet.

    b. extranet.

    c. enterprise network.

    d. virtual private network.

    22

    (Points: 1.0)

  • 8/2/2019 System Test 2

    7/29

    .

    Which generation of network are wireless cellular phone systems entering?

    a. 2.5G

    b. 3G

    c. 3.5G

    d. 4G

    23

    .

    (Points: 1.0)

    Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power,radio-based communication.

    a. four

    b. six

    c. eight

    d. ten

    24

    .

    (Points: 1.0)

    Decision-support systems help managers make decisions that are unique, rapidly changing, andnot easily specified in advance.

    TrueFalse

    25.

    (Points: 1.0)

    The range of Wi-Fi networks can be extended up to two miles by using external antennae.

    TrueFalse

    26

    .

    (Points: 1.0)

    Viruses can be spread through e-mail.

  • 8/2/2019 System Test 2

    8/29

    TrueFalse

    27

    .

    (Points: 1.0)

    Computer worms spread much more rapidly than computer viruses.

    TrueFalse

    28

    .

    (Points: 1.0)

    Large amounts of data stored in electronic form are ________ than the same data in manualform.

    a. less vulnerable to damage

    b. more secure

    c. vulnerable to many more kinds of threats

    d. more critical to most businesses

    29

    .

    (Points: 1.0)

    Electronic data are more susceptible to destruction, fraud, error, and misuse becauseinformation systems concentrate data in computer files that

    a. are usually bound up in legacy systems that are difficult to access and difficult to correct incase of error.

    b. are not secure because the technology to secure them did not exist at the time the files werecreated.

    c. have the potential to be accessed by large numbers of people and by groups outside of theorganization.

    d. are frequently available on the Internet.

    30

    .

    (Points: 1.0)

    Specific security challenges that threaten the communications lines in a client/serverenvironment include

  • 8/2/2019 System Test 2

    9/29

    a. tapping; sniffing; message alteration; radiation.

    b. hacking; vandalism; denial of service attacks.

    c. theft, copying, alteration of data; hardware or software failure.

    d. unauthorized access; errors; spyware.

    31

    .

    (Points: 1.0)

    The Internet poses specific security problems because

    a. it was designed to be easily accessible.

    b. Internet standards are universal.

    c. everyone uses the Internet.

    d. it changes so rapidly.

    32

    .

    (Points: 1.0)

    The main security problem on the Internet is

    a. hackers.

    b. radiation.

    c. bandwidth theft.

    d. natural disasters, such as floods and fires.

    33

    .

    (Points: 1.0)

    Redirecting a Web link to a different address is a form of

    a. snooping.

    b. spoofing.

    c. sniffing.

  • 8/2/2019 System Test 2

    10/29

    d. war driving.

    34

    .

    (Points: 1.0)

    How do hackers create a botnet?

    a. by infecting Web search bots with malware

    b. by using Web search bots to infect other computers

    c. by causing other people's computers to become "zombie" PCs following a master computer

    d. by infecting corporate servers with "zombie" Trojan horses that allow undetected access

    through a back door

    35

    .

    (Points: 1.0)

    Phishing is a form of

    a. spoofing.

    b. spinning.

    c. snooping.

    d. sniffing.

    36

    .

    (Points: 1.0)

    Phishing involves

    a. setting up bogus Wi-Fi hot spots.

    b. setting up fake Web sites to ask users for confidential information.

    c. pretending to be a legitimate business's representative in order to garner information about asecurity system.

    d. using e-mails for threats or harassment.

    37

    .

    (Points: 1.0)

  • 8/2/2019 System Test 2

    11/29

    Evil twins are

    a. Trojan horses that appears to the user to be a legitimate commercial software application.

    b. e-mail messages that mimic the e-mail messages of a legitimate business.

    c. fraudulent Web sites that mimic a legitimate business's Web site.

    d. bogus wireless networks that look legitimate to users.

    38

    .

    (Points: 1.0)

    Biometric authentication

    a. is inexpensive.

    b. is used widely in Europe for security applications.

    c. can use a person's face as a unique, measurable trait.

    d. only uses physical traits as a measurement.

    39

    .

    (Points: 1.0)

    A firewall allows the organization to

    a. enforce a security policy on traffic between its network and the Internet.

    b. check the accuracy of all transactions between its network and the Internet.

    c. create an enterprise system on the Internet.

    d. check the content of all incoming and outgoing e-mail messages.

    40

    .

    (Points: 1.0)

    ________ use scanning software to look for known problems such as bad passwords, theremoval of important files, security attacks in progress, and system administration errors.

    a. Stateful inspections

    b. Intrusion detection systems

    c. Application proxy filtering technologies

  • 8/2/2019 System Test 2

    12/29

    d. Packet filtering technologies

    41

    .

    (Points: 1.0)

    Currently, the protocols used for secure information transfer over the Internet are

    a. SSL, TLS, and S-HTTP.

    b. TCP/IP and SSL.

    c. S-HTTP and CA.

    d. HTTP and TCP/IP.

    42

    .

    (Points: 1.0)

    Most antivirus software is effective against

    a. only those viruses active on the Internet and through e-mail.

    b. any virus.

    c. any virus except those in wireless communications applications.

    d. only those viruses already known when the software is written.

    43

    .

    (Points: 1.0)

    In which method of encryption is a single encryption key sent to the receiver so both senderand receiver share the same key?

    a. SSL

    b. symmetric key encryption

    c. public key encryption

    d. private key encryption

    44

    .

    (Points: 1.0)

  • 8/2/2019 System Test 2

    13/29

    Malicious software programs referred to as ________ include a variety of threats such ascomputer viruses, worms, and Trojan horses.

    a. worm

    b. malware

    c. none of the above

    d. all of the above

    45

    .

    (Points: 1.0)

    ________ is a crime in which an imposter obtains key pieces of personal information toimpersonate someone else.

    a. Identity theft

    b. computer viruses

    c. none of the above

    d. all of teh above

    46

    .

    (Points: 1.0)

    In a Web-based database, middleware is used to transfer information from the organization'sinternal database back to the Web server for delivery in the form of a Web page to the user.

    TrueFalse

    47.

    (Points: 1.0)

    A Web interface requires changes to the internal database.

    TrueFalse

    48

    .

    (Points: 1.0)

    Common Gateway Interface is a specification for processing data on a Web server.

  • 8/2/2019 System Test 2

    14/29

    TrueFalse

    49

    .

    (Points: 1.0)

    Scalability refers to the ability of a computer, product, or system to expand to serve a largenumber of users without breaking down.

    TrueFalse

    50

    .

    (Points: 1.0)

    TCO refers to the original cost of purchased technology: both hardware and software.

    TrueFalse

    51

    .

    (Points: 1.0)

    A network that connects authorized customers, suppliers, and other business partners toportions of a firm's internal network is called a(n)

    a. intranet.

    b. extranet.

    c. enterprise network.

    d. virtual private network.

    52

    .

    (Points: 1.0)

    Computer worms spread much more rapidly than computer viruses.

    TrueFalse

    53

    .

    (Points: 1.0)

    One form of spoofing involves forging the return address on an e-mail so that the e-mail

    message appears to come from someone other than the sender.

  • 8/2/2019 System Test 2

    15/29

    TrueFalse

    54

    .

    (Points: 1.0)

    Sniffers enable hackers to steal proprietary information from anywhere on a network, includinge-mail messages, company files, and confidential reports.

    TrueFalse

    55

    .

    (Points: 1.0)

    Which model can be used to analyze the direct and indirect costs to help firms determine theactual cost of specific technology implementations?

    a. total cost of ownership

    b. return on investment

    c. breakeven point

    d. cost benefit analysis

    56

    .

    (Points: 1.0)

    Hardware and software acquisition costs account for about ________ percent of TCO.

    a. 20

    b. 40

    c. 60

    d. 80

    57

    .

    (Points: 1.0)

    Which of the following refers to the ability of a computer, product, or system to expand toserve a larger number of users without breaking down?

  • 8/2/2019 System Test 2

    16/29

    a. modality

    b. scalability

    c. expandability

    d. disintermediation

    58

    .

    (Points: 1.0)

    68) As discussed in the Interactive Session: Technology, what problem was MySpace facing inits data management?

    a. program-data dependence

    b. data redundancy

    c. scalability

    d. data quality

    59

    .

    (Points: 1.0)

    Data cleansing not only corrects errors but also

    a. establishes logical relationships between data.

    b. structures data.

    c. normalizes data.

    d. enforces consistency among different sets of data.

    60

    .

    (Points: 1.0)

    A(n) ________ view shows data as it is actually organized and structured on the data storagemedia.

    a. manual

    b. logical

  • 8/2/2019 System Test 2

    17/29

    c. physical

    d. all of the above

    61

    .

    (Points: 1.0)

    A(n) ________ is software that handles all application operations between browser-basedcomputers and a company's back-end business applications or databases.

    a. application software

    b. analyze

    c. server

    d. application server

    62

    .

    (Points: 1.0)

    ________ are the formal rules governing the maintenance, distribution, and use of informationin an organization.

    a. standards

    b. Information policies

    c. productures

    d. all of the above

    63

    .

    (Points: 1.0)

    Mass customization is a form of mass production.

    TrueFalse

    64

    .

    (Points: 1.0)

    Strong linkages to customers and suppliers decrease switching costs.

  • 8/2/2019 System Test 2

    18/29

    TrueFalse

    65

    .

    (Points: 1.0)

    An example of synergy in business is

    a. Amazon's use of the Internet to sell books.

    b. JP Morgan Chase's merger with Bank One Corporation, which provided JP Morgan with anetwork of retail branches in new regions.

    c. Blockbuster combining traditional video rental with online video rental.

    d. Wal-Mart's order entry and inventory management system to coordinate with suppliers.

    66

    .

    (Points: 1.0)

    Network economics

    a. applies the law of diminishing returns to communities of users.

    b. applies traditional economics to networked users.

    c. sees the cost of adding new members as inconsequential.

    d. balances the high cost of adding new members to a community against the lower cost ofusing network infrastructure.

    67

    .

    (Points: 1.0)

    Operational management is responsible for directing the day-to-day operations of the businessand therefore needs transaction-level information.

    TrueFalse

    68

    .

    (Points: 1.0)

    Deciding whether to introduce a new product line is the responsibility of an operationalmanager.

    TrueFalse

  • 8/2/2019 System Test 2

    19/29

    69

    .

    (Points: 1.0)

    You have been hired by a non-profit agency to implement a system to handle their donations.

    Event fundraisers need to be able to quickly access a donor's information and history. Themarketing department needs to be able to create customized mailing lists, in order to senddifferent messages to different types of donors. What system will best meet these needs?

    a. TPS

    b. TPS with DSS capabilities

    c. TPS with MIS capabilities

    d. TPS with ESS capabilities

    70

    .

    (Points: 1.0)

    Executive support systems are information systems that support the

    a. long-range planning activities of senior management.

    b. knowledge and data workers in an organization.

    c. decision-making and administrative activities of middle managers.

    d. day-to-day processes of production.

    71

    .

    (Points: 1.0)

    Maintaining the organization's financial records is a central purpose of which main businessfunction?

    a. manufacturing and accounting

    b. finance and accounting

    c. sales and manufacturing

    d. finance and sales

  • 8/2/2019 System Test 2

    20/29

    72

    .

    (Points: 1.0)

    In a business hierarchy, the level that is responsible for monitoring the daily activities of the

    business is

    a. middle management.

    b. service workers.

    c. production management.

    d. operational management.

    73.

    (Points: 1.0)

    Which of the following are environmental actors that interact with an organization and itsinformation systems?

    a. customers

    b. suppliers

    c. regulatory agencies

    d. all of the above

    74

    .

    (Points: 1.0)

    From a business perspective, raw data is transformed systematically during various stages,transforming it into valuable information, in a process called

    a. the information value chain.

    b. the IT value chain.

    c. information processing.

    d. feedback.

    75

    .

    (Points: 1.0)

  • 8/2/2019 System Test 2

    21/29

    A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discretestates such as 1-bits and 0-bits.

    a. Analog

    b. Wave

    c. digital

    d. all the above

    76

    .

    (Points: 1.0)

    Which of the following is NOT one of the main problems with a traditional file environment?

    a. data inconsistency

    b. lack of flexibility in creating ad-hoc reports

    c. program-data independence

    d. poor security

    77

    .

    (Points: 1.0)

    The confusion created by ________ makes it difficult for companies to create customerrelationship management, supply chain management, or enterprise systems that integrate datafrom different sources.

    a. batch processing

    b. data independence

    c. data redundancy

    d. online processing

    78

    .

    (Points: 1.0)

    What legal mechanism protects the owners of intellectual property from having their work

    copied by others?

  • 8/2/2019 System Test 2

    22/29

    a. patent protection

    b. intellectual property law

    c. copyright law

    d. Fair Use Doctrine

    79

    .

    (Points: 1.0)

    Which of the following is not one of the three principal sources of poor system performance?

    a. software bugs and errors

    b. hardware or facility failures caused by natural or other causes.

    c. insufficient integration with external systems.

    d. poor input data quality.

    80

    .

    (Points: 1.0)

    The logical view

    a. shows how data are organized and structured on the storage media.

    b. presents an entry screen to the user.

    c. allows the creation of supplementary reports.

    d. presents data as they would be perceived by end users.

    81

    .

    (Points: 1.0)

    DBMSs typically include report-generating tools in order to

    a. retrieve and display data.

    b. display data in an easier-to-read format.

    c. display data in graphs.

  • 8/2/2019 System Test 2

    23/29

    d. perform predictive analysis.

    82

    .

    (Points: 1.0)

    The process of streamlining data to minimize redundancy and awkward many-to-manyrelationships is called

    a. normalization.

    b. data scrubbing.

    c. data cleansing.

    d. data defining.

    83

    .

    (Points: 1.0)

    A schematic of the entire database that describes the relationships in a database is called a(n)

    a. data dictionary.

    b. intersection relationship diagram.

    c. entity-relationship diagram.

    d. data definition diagram.

    84

    .

    (Points: 1.0)

    Tools for consolidating, analyzing, and providing access to vast amounts of data to help usersmake better business decisions are known as

    a. DSS.

    b. OLAP.

    c. data mining.

    d. business intelligence

  • 8/2/2019 System Test 2

    24/29

    85

    .

    (Points: 1.0)

    Data mining is a tool for allowing users to

    a. quickly compare transaction data gathered over many years.

    b. find hidden relationships in data.

    c. obtain online answers to ad hoc questions in a rapid amount of time.

    d. summarize massive amounts of data into much smaller, traditional reports.

    86

    .

    (Points: 1.0)

    The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, andinventorying information is called a(n)

    a. information policy.

    b. data definition file.

    c. data quality audit.

    d. data governance policy.

    87

    .

    (Points: 1.0)

    The special organizational function whose responsibilities include the technical and operationalaspects of managing data, including physical database design and maintenance, is called

    a. data qulity audit.

    b. database administration.

    c. information policy administration.

    d. data auditing.

    88

    .

    (Points: 1.0)

    Databases record information about general categories of information referred to as entities.

  • 8/2/2019 System Test 2

    25/29

    TrueFalse

    89

    .

    (Points: 1.0)

    74) DBMS have a(n) ________ capability to specify the structure of the content of thedatabase.

    a. data dictionary

    b. database

    c. data mining

    d. data definition

    90

    .

    (Points: 1.0)

    A(n) ________ database is one that is stored in more than one physical location.

    a. centralized

    b. decentralized

    c. distributed

    d. network

    91

    .

    (Points: 1.0)

    In clustering, a data mining tool discovers different groupings within data, such as findingaffinity groups for bank cards.

    TrueFalse

    92

    .

    (Points: 1.0)

    ________ takes place when a firm contracts custom software development or maintenance ofexisting legacy programs to outside firms.

    a. insourcing

  • 8/2/2019 System Test 2

    26/29

    b. Outsourcing

    c. consulting

    d. all of the above

    93

    .

    (Points: 1.0)

    Nanotechnology uses individual atoms and molecules to create computer chips and otherdevices thinner than a human hair.

    TrueFalse

    94.

    (Points: 1.0)

    OODBMS are slower than relational DBMS.

    TrueFalse

    95

    .

    (Points: 1.0)

    A data dictionary is a language associated with a database management system that end usersand programmers use to manipulate data in the database.

    TrueFalse

    96

    .

    (Points: 1.0)

    In a relational database, complex groupings of data must be streamlined to eliminate awkwardmany-to-many relationships.

    TrueFalse

    97

    .

    (Points: 1.0)

    A data warehouse may be updated by a legacy system.

    TrueFalse

  • 8/2/2019 System Test 2

    27/29

    98

    .

    (Points: 1.0)

    Software that manages the resources of the computer is called

    a. application software.

    b. data management software.

    c. operating system software.

    d. network software.

    99

    .

    (Points: 1.0)

    The business case for using grid computing involves all of the following EXCEPT

    a. increased accuracy.

    b. cost savings.

    c. speed of computation.

    d. agility.

    100

    .

    (Points: 1.0)

    Which type of computing refers to firms purchasing computing power from remote providersand paying only for the computing power they use?

    a. on-demand

    b. grid

    c. edge

    d. autonomic

    101

    .

    (Points: 1.0)

    The business case for using grid computing involves all of the following EXCEPT

    a. cost savings.

  • 8/2/2019 System Test 2

    28/29

    b. increased accuracy.

    c. speed of computation.

    d. agility.

    102

    .

    (Points: 1.0)

    An example of autonomic computing is

    a. spyware protection software that runs and updates itself automatically.

    b. software programmed to run on any hardware platform.

    c. cell phones taking on the functions of handheld computers.

    d. programming languages that allow non-programmers to create custom applications.

    103

    .

    (Points: 1.0)

    Which type of software is created and updated by a worldwide community of programmersand available for free?

    a. software packages

    b. mashups

    c. outsourced

    d. open source

    104

    .

    (Points: 1.0)

    Linux is:

    a. primarily concerned with the tasks of end users.

    b. designed for specific machines and specific microprocessors.

    c. especially useful for processing numeric data.

    d. an example of open-source software.

  • 8/2/2019 System Test 2

    29/29

    105

    .

    (Points: 1.0)

    A software tool with a graphical user interface for displaying Web pages and for accessing the

    Web and other Internet resources is called a:

    a. JVM.

    b. FTP client.

    c. Web browser.

    d. All of the above.