Download COSC 1200, Computer Information Systems Spring 2000

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
COSC 1200, Computer Information Systems
Spring 2000
Lecture Exam 2
1.
If your bubble sheet is torn or folded the computer will not properly read it. See your instructor for
another sheet.
2.
Fill in your last name followed by a space followed by your first name and code your name in the
bubble sheet
3.
Put your LAB section number in spaces K and L and code it in the bubbles.
4.
Put your answers on side 1, the side with your name. Put your answers in the bubble sections marked
1 through 30.
AFTER YOU COMPLETE THE EXAM:
1. Check to make sure that your name and lab section number are properly entered in your bubble sheet.
2.
Submit the bubble sheet to the COSC 1200 instructor in your exam room. You may keep the exam.
For each of the following questions, choose the best possible answer from choices a - e, and code your
choice on the answer sheet.
1.
a.
b.
c.
The Internet was originally started by
Bill Gates
Stanford University
the World Wide Web
2.
a.
*b.
c.
Each Web page is identified by a special address called the
Hypertext Transfer Protocol (HTTP)
d. Hypertext Markup Language (HTML)
Universal Resource Locator (URL)
e. File Transfer Protocol (FTP)
World Wide Web (WWW)
3.
a.
b.
*c.
What is an advantage of using fiber optic cable as a communication media?
low cost
d. good for narrow band transmission
eliminates the need for a modem
e. there are no advantages
not susceptible to electronic interference
d. Netscape Corporation
*e. the Department of Defense
4.
Sara is a system administrator for her department. The equipment committee allocates $25,000 for a
teaching lab. Sara is put in charge of implementing the lab. She contacts telecommunications and
arranges to have the lab wired with 15 network connections. She needs a network communications
media that will be reasonably priced and transmit data up to 100 mbps. Sara should choose
*a. twisted pairs (UTP category 5)
d. microwave transmission
b. coaxial cable
e. satellite transmission
c. fiber optic cable
5.
Sara also needs to purchase 10 computers and a server for the lab. She wants standard PCs for the lab
computers and a higher end PC for the server. Sara sends these general requirements to the purchasing
department and they send out a ______________ to their vendors.
a. RFC (Request for Computers)
*b. RFP (Request for Proposal)
c. RFQ (Request for Quotations)
d. RFT (Request for Transactions)
e. RFH (Request for Help)
6.
a.
b.
c.
Jason lives in the dormitories. He wants to directly connect his personal computer to the campus
network. What does he need to add to his PC?
a coaxial network map
d. narrow band transmission booster
a file server
*e. a network interface card
a microwave transmitter
7.
a.
b.
*c.
d.
e.
Devices that direct messages along specific paths in a network are called
modems
concentrators
routers
repeaters
message controllers
8.
a.
*b.
c.
d.
e.
Data transmission speed is often measured in units of
mph (miles per hour)
mbps (megabits per second)
MHz (megahertz)
pps (packets per second)
mpd (messages per day)
9.
The type of network topology in which computers are connected serially to one another in a loop and
there is no central computer is a
a. client – server network
b. star network
c. bus network
*d. ring network
e. cellular network
10.
a.
b.
*c.
d.
e.
Which of the following devices is commonly used to share storage on a LAN (local area network)?
fax server
mail server
file server
print server
internet server
11.
*a.
b.
c.
d.
e.
A hierarchical local network is an example of a(n) ___________ topology.
star
LAN
bus
WAN
token ring
12. A private network, set up by a company for employees, that implements the infrastructure of the
Internet, but is protected from outside penetration by security devices called firewalls is known as a(n)
a. cellular network
d. public-access network
b. bridge
*e. intranet
c. gateway
13. Mary lives off campus in an apartment. She wants to dial into the campus network so she needs to
make sure her computer has a
a. network card
d. sound card
*b. modem
e. bridge
c. token ring protocol
14. A collection of hardware and software that enables two dissimilar networks (such as a LAN and a
WAN) to communicate is called a(n)
a. bridge
*d. gateway
b. host
e. Ethernet protocol
c. token passing protocol
15.
a.
*b.
c.
The communications protocol most identified with the Intranet is
token passing
d. IPX
TCP/IP
e. NetBEUI
CSMA/CD
16.
a.
b.
c.
Transaction processing tasks in an organization can be categorized as ____________applications.
artificial intelligence
d. decision support system
office automation
*e. accounting
e-mail
17.
a.
b.
*c.
d.
e.
Large transaction processing systems are generally built using
prototyping
end-user development
a traditional approach to systems development (7 step)
top-down systems development
rapid applications development (RAD)
18. Fred has been working for Parity Inc. for almost forty years. In his current position, most of his time is
spent establishing objectives for the organization (planning the company's future). This process is
called
a. transactional planning.
d. structured planning.
b. tactical planning.
*e. strategic planning.
c. operational planning.
19.
*a.
b.
c.
What type of computerized business system would be most useful for Fred (from the question above)?
executive information system
d. word processing system
scheduling support system
e. computer-aided design system
information reporting system
20.
a.
b.
*c.
The acronyms CAD, CAM, and CIM collectively refer to the use of computers in
decision support
d. office automation
artificial intelligence
e. telecommuting
design and manufacturing
21. Robin works for the University Bookstore in Fort Collins, Colorado. It is two weeks before the
semester is to begin, and they have just experience a major flood. All of the Computer Information
Systems books have been destroyed and they need to replace them as soon as possible. Her boss asks
her for a report that lists all the used book outlets in Denver that carry the book and the number of
books that can be obtained from each outlet. This type of report is called a
a. scheduled report
d. book report
b. exception report
e. flood damage report
*c. demand report
22.
a.
b.
*c.
The process of contracting systems development activities to an outside firm is known as
end-user systems development
d. artificial intelligence
prototyping
e. telecommuting
outsourcing
23. Jeremy has been hired to set up a small computer system for ECO construction company in Laramie,
WY. They want 5 PCs connected to a common file server, running Windows NT as the network
operating system and Office 2000 as a shared application software. Which system development
methodology would be the most practical for Jeremy to use in this situation?
a. seven step system development life cycle
d. end user development
b. CASE tool development
e. computer aided design
*c. prototyping
24. Kim is a financial analyst for Fix-Me-Quick financial services. Using Visual Basic and Excel, she has
developed an application which calculates five-year projected financial statements for each company
that hires the services of Fix-Me-Quick. This process is called
a. prototyping
d. systems analysis and design
*b. end user development
e. financial system modeling
c. CASE tool development
25. Frank is working on his COSC 1200 homework. Using Excel, he has created a worksheet for a small
airplane rental company. In the worksheet, he calculates the revenue generated by each plane for the month
of January. He wants to create a chart that will show each plane’s percentage of the total revenue for
January. What type of chart should he choose?
a. bar chart
*d. pie chart
b. column chart
e. scatter chart
c. line chart
For questions 26 - 30, match each process with the step in the system development life cycle in which it
occurs (choices a - e ), and code your choice on the answer sheet. The choices (a-e) may be used more than
once or not at all.
26 - c.
27 - e.
28 - d.
29 - b.
30 - c.
a.
b.
c.
d.
e.
determine whether or not the problem can be solved within the budgetary constraints
investigate the problem by meeting with mangers and users
produce the Functional Specifications document (acts as a contract)
send out Requests for Proposals or Requests for Quotations to vendors
prepare a cost/benefit analysis for the proposed system
system design
acquisition/programming
feasibility study
system analysis
preliminary investigation