Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
COSC 1200, Computer Information Systems Spring 2000 Lecture Exam 2 1. If your bubble sheet is torn or folded the computer will not properly read it. See your instructor for another sheet. 2. Fill in your last name followed by a space followed by your first name and code your name in the bubble sheet 3. Put your LAB section number in spaces K and L and code it in the bubbles. 4. Put your answers on side 1, the side with your name. Put your answers in the bubble sections marked 1 through 30. AFTER YOU COMPLETE THE EXAM: 1. Check to make sure that your name and lab section number are properly entered in your bubble sheet. 2. Submit the bubble sheet to the COSC 1200 instructor in your exam room. You may keep the exam. For each of the following questions, choose the best possible answer from choices a - e, and code your choice on the answer sheet. 1. a. b. c. The Internet was originally started by Bill Gates Stanford University the World Wide Web 2. a. *b. c. Each Web page is identified by a special address called the Hypertext Transfer Protocol (HTTP) d. Hypertext Markup Language (HTML) Universal Resource Locator (URL) e. File Transfer Protocol (FTP) World Wide Web (WWW) 3. a. b. *c. What is an advantage of using fiber optic cable as a communication media? low cost d. good for narrow band transmission eliminates the need for a modem e. there are no advantages not susceptible to electronic interference d. Netscape Corporation *e. the Department of Defense 4. Sara is a system administrator for her department. The equipment committee allocates $25,000 for a teaching lab. Sara is put in charge of implementing the lab. She contacts telecommunications and arranges to have the lab wired with 15 network connections. She needs a network communications media that will be reasonably priced and transmit data up to 100 mbps. Sara should choose *a. twisted pairs (UTP category 5) d. microwave transmission b. coaxial cable e. satellite transmission c. fiber optic cable 5. Sara also needs to purchase 10 computers and a server for the lab. She wants standard PCs for the lab computers and a higher end PC for the server. Sara sends these general requirements to the purchasing department and they send out a ______________ to their vendors. a. RFC (Request for Computers) *b. RFP (Request for Proposal) c. RFQ (Request for Quotations) d. RFT (Request for Transactions) e. RFH (Request for Help) 6. a. b. c. Jason lives in the dormitories. He wants to directly connect his personal computer to the campus network. What does he need to add to his PC? a coaxial network map d. narrow band transmission booster a file server *e. a network interface card a microwave transmitter 7. a. b. *c. d. e. Devices that direct messages along specific paths in a network are called modems concentrators routers repeaters message controllers 8. a. *b. c. d. e. Data transmission speed is often measured in units of mph (miles per hour) mbps (megabits per second) MHz (megahertz) pps (packets per second) mpd (messages per day) 9. The type of network topology in which computers are connected serially to one another in a loop and there is no central computer is a a. client – server network b. star network c. bus network *d. ring network e. cellular network 10. a. b. *c. d. e. Which of the following devices is commonly used to share storage on a LAN (local area network)? fax server mail server file server print server internet server 11. *a. b. c. d. e. A hierarchical local network is an example of a(n) ___________ topology. star LAN bus WAN token ring 12. A private network, set up by a company for employees, that implements the infrastructure of the Internet, but is protected from outside penetration by security devices called firewalls is known as a(n) a. cellular network d. public-access network b. bridge *e. intranet c. gateway 13. Mary lives off campus in an apartment. She wants to dial into the campus network so she needs to make sure her computer has a a. network card d. sound card *b. modem e. bridge c. token ring protocol 14. A collection of hardware and software that enables two dissimilar networks (such as a LAN and a WAN) to communicate is called a(n) a. bridge *d. gateway b. host e. Ethernet protocol c. token passing protocol 15. a. *b. c. The communications protocol most identified with the Intranet is token passing d. IPX TCP/IP e. NetBEUI CSMA/CD 16. a. b. c. Transaction processing tasks in an organization can be categorized as ____________applications. artificial intelligence d. decision support system office automation *e. accounting e-mail 17. a. b. *c. d. e. Large transaction processing systems are generally built using prototyping end-user development a traditional approach to systems development (7 step) top-down systems development rapid applications development (RAD) 18. Fred has been working for Parity Inc. for almost forty years. In his current position, most of his time is spent establishing objectives for the organization (planning the company's future). This process is called a. transactional planning. d. structured planning. b. tactical planning. *e. strategic planning. c. operational planning. 19. *a. b. c. What type of computerized business system would be most useful for Fred (from the question above)? executive information system d. word processing system scheduling support system e. computer-aided design system information reporting system 20. a. b. *c. The acronyms CAD, CAM, and CIM collectively refer to the use of computers in decision support d. office automation artificial intelligence e. telecommuting design and manufacturing 21. Robin works for the University Bookstore in Fort Collins, Colorado. It is two weeks before the semester is to begin, and they have just experience a major flood. All of the Computer Information Systems books have been destroyed and they need to replace them as soon as possible. Her boss asks her for a report that lists all the used book outlets in Denver that carry the book and the number of books that can be obtained from each outlet. This type of report is called a a. scheduled report d. book report b. exception report e. flood damage report *c. demand report 22. a. b. *c. The process of contracting systems development activities to an outside firm is known as end-user systems development d. artificial intelligence prototyping e. telecommuting outsourcing 23. Jeremy has been hired to set up a small computer system for ECO construction company in Laramie, WY. They want 5 PCs connected to a common file server, running Windows NT as the network operating system and Office 2000 as a shared application software. Which system development methodology would be the most practical for Jeremy to use in this situation? a. seven step system development life cycle d. end user development b. CASE tool development e. computer aided design *c. prototyping 24. Kim is a financial analyst for Fix-Me-Quick financial services. Using Visual Basic and Excel, she has developed an application which calculates five-year projected financial statements for each company that hires the services of Fix-Me-Quick. This process is called a. prototyping d. systems analysis and design *b. end user development e. financial system modeling c. CASE tool development 25. Frank is working on his COSC 1200 homework. Using Excel, he has created a worksheet for a small airplane rental company. In the worksheet, he calculates the revenue generated by each plane for the month of January. He wants to create a chart that will show each plane’s percentage of the total revenue for January. What type of chart should he choose? a. bar chart *d. pie chart b. column chart e. scatter chart c. line chart For questions 26 - 30, match each process with the step in the system development life cycle in which it occurs (choices a - e ), and code your choice on the answer sheet. The choices (a-e) may be used more than once or not at all. 26 - c. 27 - e. 28 - d. 29 - b. 30 - c. a. b. c. d. e. determine whether or not the problem can be solved within the budgetary constraints investigate the problem by meeting with mangers and users produce the Functional Specifications document (acts as a contract) send out Requests for Proposals or Requests for Quotations to vendors prepare a cost/benefit analysis for the proposed system system design acquisition/programming feasibility study system analysis preliminary investigation