Download multiple-choice-question-chapters-6-to-9

Document related concepts
no text concepts found
Transcript
lOMoARcPSD|9801498
Multiple Choice question chapters 6 to 9
Business Information System (Algonquin College)
StuDocu is not sponsored or endorsed by any college or university
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
Chapter 06
Systems Development: Phases, Tools, and Techniques
Multiple Choice Questions
1. Which of the following systems development techniques requires IT specialists that are inhouse to develop information systems?
A. Outsourci
ng
B. Insourcin
g
C. In-house
specialization
D. Selfsourcin
g
2. Which of the following systems development techniques allows end users to develop
information systems?
A. Outsourci
ng
B. Insourcin
g
C. Netsourci
ng
D. Selfsourcin
g
3. If you were developing marketing strategies and you decided to create a database that
tracked the progress of your marketing efforts, what kind of development would you be
engaging in?
A. Outsourci
ng
B. Netsourci
ng
C. Selfsourcin
g
D. Insourcin
g
1
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
4. Which of the following systems development techniques delegate development tasks to a
third party for a specified cost, period of time, and level of service?
A. Netsourci
ng
B. Outsourci
ng
C. Insourcin
g
D. Selfsourcin
g
5. What is the difference between insourcing and selfsourcing?
A. Selfsourcing requires the use of internal consultants; insourcing requires staff from the IT
department.
B. Selfsourcing is self-regulating; insourcing requires internal quality
controls.
C. Selfsourcing allows for end user development; insourcing requires
internal IT staff.
D. Selfsourcing allows for one person to complete the systems development life cycle;
insourcing is a team effort.
6. The systems development life cycle (SDLC) is:
A. a method for testing new IT
applications.
B. a structured approach for developing information
systems.
C. the analysis and assessment tasks that need to be completed when designing and
developing information systems.
D. a set of guidelines that an end user follows when developing their own business
applications.
7. The waterfall methodology is:
A. a sequential, activity-based process in which one phase of the SDLC is followed
by another.
B. an assessment methodology that ensures quality
applications.
C. an outsource development methodology to information
systems.
D. a process management technique that identifies and includes end users and
management in the SDLC.
2
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
8. The SDLC contains seven phases. Which phase is devoted to creating a solid plan for
developing your information system?
A. Initiati
on
B. Plannin
g
C. Desig
n
D. Analysi
s
9. Which of the following is a characteristic of a proposed system that is essential to the
success of your organization?
A. Quality and essence
metric
B. Vital
requirement
C. Critical success
factor
D. Essential design
feature
10. A project scope document is:
A. a document that outlines the project's strategy, the responsibilities of project team
members, and the assessment measures that will determine the rate of success
B. a one-paragraph statement about the scope of the
proposed project
C. a detailed document identifying the goals, scope and strategy for the
proposed project
D. a document that identifies the parameters or boundaries of the proposed system and how
it fits into existing systems
11. Which of the following occurs when the scope of the project increases beyond its original
intentions?
A. Scope
creep
B. Feature
creep
C. Mileston
e
D. Rolling
stone
3
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
12. Which of the following occurs when developers and end users add extra features that were
not part of the initial requirements?
A. Scope
creep
B. Feature
creep
C. Mileston
e
D. Rolling
stone
13. What document defines the what, when, and who questions of systems development
including all activities to be performed, the individuals, or resources, who will perform the
activities, and the time required to complete each activity?
A. Requiremen
ts
B. Project
plan
C. Project
milestones
D. Critical success
factors
14. _____ defines and develops the project plan, and tracks the plan to ensure that all key
project milestones are completed on time.
A. End
user
B. Project
manager
C. Project
executive
D. IT
Administrator
15. _____ represent key dates by which you need a certain group of activities performed.
A. Enduring
goals
B. Business
plans
C. Feature
creeps
D. Project
milestones
4
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
16. Which phase in the SDLC involves end users and IT specialist working together to gather,
understand, and document the business requirements for the proposed system?
A. Initiati
on
B. Plannin
g
C. Desig
n
D. Analysi
s
17. Business requirements are:
A. the strategic and tactical goals that a business establishes for itself that software
must align with.
B. the detailed set of requests that the proposed information system must meet to
be successful.
C. the planning documents identifying the characteristics and functionality of the proposed
information system.
D. the logical designs for the proposed information
system.
18. "The proposed information system must connect 25,000 employees, working in five satellite
sites of Europe, U.S., and Africa" is an example of a(n) ____.
A. company
mission
B. milesto
ne
C. feature
creep
D. business
requirement
19. When IT specialists and end users meet in one location to define and review the business
requirements of a proposed system, the meeting is called a ____.
A. requirements
meeting
B. planning and analysis
meeting
C. joint application development
session
D. rapid
prototyping
5
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
20. Once all the business requirements are defined, you must prioritize them in order of
business importance and place them in a formal comprehensive document, called a(n) ____.
A. requirements assessment
document
B. requirements definition
document
C. document of
requisites
D. essential requirements
document
21. The primary goal of which phase in the SDLC is to build a technical blueprint of how the
proposed system will work?
A. Desig
n
B. Plannin
g
C. Analysi
s
D. Developme
nt
22. Which of the following is considered a technical architecture for a proposed system?
A. A description of the needed hardware, software, and telecommunications
equipment.
B. A drawing or graphical representation of the proposed system including proposed screens,
reports, software, and databases.
C. A logical model that defines the structure of needed modules and sub modules and their
interrelationships.
D. The needed data structures, definitions and
business rules.
23. What is the difference between the design phase and the analysis phase?
A. The analysis phase follows the design phase and examines the requirements developed
during the design phase.
B. The design phase creates the code from the logical requirements developed in the
analysis phase.
C. Analysis and design belong to the same phase and create an iterative process between
the two activities.
D. The design phase takes the requirements developed in the analysis phase and creates a
design based on that.
6
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
24. The SDLC contains seven phases. Which phase transforms the design into an actual
system?
A. Desig
n
B. Expansio
n
C. Developme
nt
D. Transformati
on
25. Which phase in the SDLC verifies that the system works and meets all the business
requirements developed in the analysis phase?
A. Developme
nt
B. Transformati
on
C. Implementati
on
D. Testin
g
26. To ensure that the newly developed information systems functions properly, what should
you create that lists the expected steps that the system should perform and expected
results from these steps?
A. Requirement
documents
B. Test
conditions
C. Design
specifications
D. Logical design
specifications
27. _____ verifies that separate systems can work together.
A. Unit
testing
B. System
testing
C. Integration
testing
D. User acceptance
testing
7
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
28. The SDLC contains seven phases. Which phase distributes the system to all the users so
that they can use it to perform their jobs?
A. Implementati
on
B. Testin
g
C. Maintenan
ce
D. Expansio
n
29. When you install the system, you must provide employees with _____ that highlights how to
use the system.
A. test
conditions
B. user
documentation
C. technical
architecture
D. requirements definition
document
30. _____ training is most suitable for difficult systems for which employees need one-on-one
time with an individual instructor.
A. Onlin
e
B. Virtu
al
C. Worksho
p
D. Corresponden
ce
31. If you were to implement the new system while the existing system continued to run, what
type of implementation method would you be following?
A. Pilot
implementation
B. Phase
implementation
C. Parallel
implementation
D. Plunge
implementation
8
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
32. If you were to allow only a select group of people to use the new system so that you could
determine if it was working correctly, what type of implementation method would you be
following?
A. Pilot
implementation
B. Parallel
implementation
C. Plunge
implementation
D. Phase
implementation
33. During the _____ phase of the SDLC, the new system is monitored and supported to ensure it
continues to meet the business goals.
A. implementati
on
B. testin
g
C. maintenan
ce
D. operatio
ns
34. What is the difference between the implementation phase and the maintenance phase?
A. The implementation phase creates the physical design (code) and tests it; the
maintenance phase places it into operations.
B. The implementation phase monitors new systems to ensure that they are working
properly; the maintenance phase makes minor adjustments when needed to meet
existing business goals.
C. The maintenance phase monitors new systems to ensure that they are working properly;
the implementation phase makes minor adjustments when needed to meet new business
goals.
D. The maintenance phase monitors and adjusts new and existing systems; the
implementation phase places new systems into operation.
9
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
35. _____ focuses on building small self-contained blocks of code that can be reused across a
variety of applications within an organization.
A. Rapid
prototyping
B. Project
scoping
C. Agile
development
D. Component-based
development
36. Which of the following methodologies emphasizes extensive user involvement in the rapid
and evolutionary construction of working prototypes?
A. SDLC
B. Waterfall
modeling
C. Project
scoping
D. Rapid application development
(RAD)
37. Which of the following methodologies breaks a project into tiny phases; programmers must
develop the code for each phase before they can continue to the next phase?
A. Project
milestones
B. Extreme
programming
C. Operational
prototyping
D. Design and build
prototyping
10
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
38. _____ is a form of XP, which aims for customer satisfaction through early and continuous
delivery of useful software components.
A. The agile
methodology
B. The service-oriented
architecture
C. Vist
a
D. Macintos
h
39. What is the difference between extreme programming (XP) and the agile methodology to
software development?
A. XP focuses on component-base development; the agile methodology focuses
on the RAD.
B. XP uses prototyping; the agile methodology
does not.
C. Agile methodology involves users much more
than XP.
D. XP focuses more on team coding; the agile methodology focuses on limiting
project scope.
40. _____ is a high-level, holistic organizational approach to how your organization views and
acts on all its software needs.
A. Service-oriented
architecture
B. Rapid
prototyping
C. RAD
D. XP
11
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
41. _____ is the development and support of IT systems by knowledge workers with little or no
help from IT specialists.
A. End-user
involvement
B. Outsourci
ng
C. Insourcin
g
D. Requirements
definition
42. What group of people knows little about IT but a lot about their own domain?
A. Domain
experts
B. Project
managers
C. End
users
D. Field
professionals
43. Which of the following is not an advantage of selfsourcing?
A. It increases the speed of systems
development.
B. It analyses the various design alternatives which lead to subpar IT
systems.
C. It increases end user participation and sense of
ownership.
D. It improves requirements
determination.
12
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
44. Which of the following is a potential risk of selfsourcing?
A. Reduced technological know-how for future
innovation.
B. Lack of documentation and external support leads to short-lived
systems.
C. Reduced degree of
control.
D. Increased dependency on outside
organizations.
45. What type of selfsourcing development tool is paramount to the success of the proposed
software?
A. Easy to use development
tools
B. Evolutionary prototyping
tools
C. Extreme programming (XP)
tools
D. Video editing
tools
46. Because end users work with a wide range of data, what toolset should they select for
selfsourcing support?
A. Sophisticated GUI
development
B. Online meeting
software
C. Collaboration
software
D. Database management
systems
13
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
47. _____ is the process of building a model that demonstrates the features of a proposed
product, service, or system.
A. RAD
B. XP
C. Prototypi
ng
D. Modelin
g
48. What is used to prove the technical feasibility of a proposed system?
A. Technical
prototype
B. Virtual
Prototype
C. Proof-of-concept
prototype
D. Selling
prototype
49. A prototype you use to convince people of the worth of a proposed system is a(n) ____.
A. buying
prototype
B. physical
prototype
C. proof-of-concept
prototype
D. selling
prototype
50. What is the first step in the prototyping process?
A. Revise and enhance the
prototype
B. Develop initial
prototype
C. Identify basic
requirements
D. End user
reviewing
14
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
51. What is the fourth and last step in the prototyping process?
A. Identify basic
requirements
B. Develop initial
prototype
C. Users
reviewing
D. Revise and enhance the
prototype
52. Which of the following is an advantage of prototyping?
A. Encourages active user
participation
B. Helps resolve discrepancies among end
users
C. Gives users a feel for the final
system
D. All of the
above
53. Which of the following is a disadvantage to prototyping?
A. Prototyping does not encourage active user
participation.
B. Prototyping does not give an indication of performance under operational
conditions.
C. Prototyping does not help determine technical
feasibility.
D. Prototyping does not help resolve discrepancies
among users.
15
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
54. According to the Outsourcing Research Council, which business function is the top
outsourcing area for many contemporary companies?
A. I
T
B. Accountin
g
C. Human
Resources
D. Financ
e
55. Which SDLC phase is performed with both internal software development and outsourcing?
A. Desig
n
B. Developme
nt
C. Maintenan
ce
D. Analysi
s
56. _____ is a formal document that describes in detail your logical requirements for a proposed
system and invites vendors to submit bids for its development.
A. Requirements
document
B. Design
specification
C. Request for proposal
(RFP)
D. Project scope
document
16
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
57. If you were constructing a legal document for your software vendor that stipulated needed
requirements, schedules, costs, acceptance criteria, and assessment metrics, what would
you be creating?
A. Service level
agreement
B. Critical
milestones
C. Critical success
factors
D. Request for
proposal
58. If your U.S.-based company were to hire a vendor located in New York City, you would be
using _____ outsourcing.
A. nearshor
e
B. domest
ic
C. onshor
e
D. interi
or
59. If your U.S.-based company were to hire a vendor from Mexico City, you would be using
_____ outsourcing.
A. offshor
e
B. onshor
e
C. nearshor
e
D. exteri
or
17
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
60. What is the trend called when a U.S. company outsources IT functions to other countries
that are geographically far away?
A. Foreign
outsourcing
B. Offshore
outsourcing
C. External
outsourcing
D. Outer
outsourcing
61. Which of the following is an advantage of outsourcing?
A. Increases technical know-how for future
innovation
B. Reduces
costs
C. Increases degree of
control
D. Reduces vulnerability of your strategic
information
62. Which of the following is a disadvantage of outsourcing?
A. It acquires outdated
technology.
B. It increases dependency on other
organizations.
C. It decreases performance
accountability.
D. It cannot predict future
costs.
True / False Questions
63. The systems development life cycle is an unstructured approach for developing information
systems.
True
False
18
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
64. Project scope clearly defines the high-level system requirements.
True
False
65. Adding additional features that were not part of the initial project definition is an example of
scope creep.
True
False
66. Scope creep and feature creep lead to better systems development projects.
True
False
67. The project plan defines the what, when, and who questions of system development.
True
False
68. Joint application development is a meeting between users and IT specialists to define and
review business requirements for the project.
True
False
69. Sign-off occurs when users and IT specialists meet to define or review the business
requirements for the system.
True
False
70. During the development phase, you develop a technical blueprint of how the proposed
system will work.
True
False
71. Users are usually involved in the testing phase as they are the most familiar with the
business requirements and test conditions.
True
False
72. Online training is excellent when employees need one-on-one time with a trainer.
True
False
73. Plunge implementation discards the old system completely and immediately uses the new
system.
True
False
74. Once a system has been created and implemented, no changes should be made to it.
True
False
19
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
75. Component based development is a general approach to systems development that focuses
on building small self-contained blocks of code that can be reused across a variety of
applications within an organization.
True
False
76. Rapid application development discourages end user involvement as it tends to slow down
the systems development process.
True
False
77. Extreme programming (XP) methodology breaks the project down into many smaller pieces
or phases.
True
False
78. The XP methodology, unlike the RAD methodology, relies heavily on reusing existing
software components contained in a software library.
True
False
79. One of the reasons for XP's success is that it stresses customer satisfaction.
True
False
80. The agile methodology is similar to XP but with more focus on team coding and less on
limiting project scope.
True
False
81. The services within the SoA architecture perspective are exactly the same as components in
any of the component-based development methodologies.
True
False
82. End users often use tools like DBMSs and spreadsheets to develop applications for their own
needs.
True
False
83. Rather than combating the trend toward end-user application development, IT staff should
leverage it to offload solution building to end users.
True
False
84. When you're developing a system just for yourself, you don't need to document how it
works.
True
False
20
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
85. One of the advantages of selfsourcing is that it increases the speed of systems
development.
True
False
86. One of the potential pitfalls of selfsourcing is that it increases the invisible backlog.
True
False
87. Lack of organizational focus creates "privatized" IT systems.
True
False
88. Lack of documentation and external support leads to short-lived systems.
True
False
89. Prototyping is an essential part of the RAD methodology.
True
False
90. An initial prototype cannot just include only user interfaces.
True
False
91. Prototyping gives no indication of performance under operational conditions.
True
False
92. The Internet is one of the main reasons behind the rapid growth of the outsourcing industry.
True
False
93. A service level agreement is an informal agreement between two parties.
True
False
94. A U.S. bank doing onshore outsourcing of some of its work is using another U.S. company.
True
False
95. A U.S. media company is paying an Indian company to do its help desk support. This would
be an example of nearshore outsourcing.
True
False
96. Outsourcing increases the technical know-how for future innovation.
True
False
21
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
22
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
Chapter 07
Infrastructure, Cloud Computing, Metrics, and Business Continuity Planning:
Building and Sustaining the Dynamic Enterprise
Multiple Choice Questions
1. Which of the following is true of service-oriented architecture (SOA)?
A. It is a perspective that focuses on acquiring brand new
systems.
B. It builds applications from non-reusable blocks
of code.
C. It focuses on the development, use, and reuse of
services.
D. It defines the source code for application programming
interfaces.
2. Which of the following is true of an organization with a service-oriented architecture
philosophy?
A. Ensures that HR initiatives remain constant regardless of changes in the
workforce
B. Takes a prolonged amount of time to implement well thought-out
decisions
C. Maintains static work processes and
structures
D. Adapts quickly to new advances in
technology
23
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
3. Genesis Technologies has adopted an SOA approach to systems development. A new
"disruptive" technology, Senstor, has recently been launched in the market which promises
to provide significant benefits to software companies that focus on collaborative process. In
such a scenario, how is Genesis Technologies most likely to react?
A. It will delay the decision making process with regard to the adoption of the new
technology.
B. It will continue to use its existing systems instead of trying out the new
technology.
C. It will use its resources efficiently to adapt itself to the new
technology.
D. It will maintain static processes and technologies which have proven to be
beneficial in the past.
4. In terms of software development, which of the following would most likely be the focus of a
company with a service-oriented architecture philosophy?
A. New deployments like Web
2.0
B. Integration of different technology
platforms
C. Standard information
formats
D. Safe and secure telecommunications
platforms
5. Which of the following is part of the hardware requirements of an SOA philosophy?
A. Large storage
capacity
B. Mobile
computing
C. Standard information
formats
D. RAD and XP development
methodologies
24
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
6. Which of the following is true about the end user of IT, according to an SOA philosophy?
A. The end user should be thought of in the same way as an external
customer.
B. The end user's needs should be considered secondary to
customers' needs.
C. The end user's access to data should be limited to a specific geographic area due to
security reasons.
D. Multi-channel service delivery should be available exclusively to end users and not
customers.
7. Which of the following is a Web 2.0 application?
A. PowerPoin
t
B. Mashup
s
C. Intran
et
D. Extran
et
8. According to the SOA philosophy, which of the following is the most important organizational
resource?
A. Service
s
B. Financial
resources
C. Informati
on
D. Internal
customers
25
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
9. Which of the following is a requirement of an SOA approach?
A. Information should be maintained in multiple
formats.
B. Strict and rigorous integrity controls should be
in place.
C. Data from different sources should not be coupled
together.
D. Duplicate information should be maintained for security
reasons.
10. Which of the following is a requirement of an SOA approach with reference to hardware?
A. The integration of different technologies should be kept to a
minimum.
B. Only wired networks should be used to reduce the risk of
unauthorized access.
C. Organizations should avoid using multiple technology
platforms.
D. Powerful storage area networks should have the capacity to store all
information needs.
11. Which of the following represents the different layers of structure, which provide support or
services?
A. Processe
s
B. Dat
a
C. Infrastructu
re
D. System
s
26
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
12. Which of the following refers to the capability of two or more computing components to
share information and other resources, even if they are made by different manufacturers?
A. Multitenancy
B. Interoperabil
ity
C. Consisten
cy
D. Serviceabili
ty
13. A team of engineers are in the process of customizing an ERP suite to meet their
organization's business needs. During the process of customization, they choose to replace
certain software modules with software that has been developed in-house. After this, they
also add modules from other vendors and plug them directly into the ERP solution. This is an
example of which of the following concepts?
A. Service level
agreement
B. Sustainable
interoperability
C. Multitenancy
D. Encapsulati
on
14. Which of the following is a fundamental underlying infrastructure for any IT environment?
A. Metadat
a
B. Cach
e
C. Networ
k
D. Primary
key
27
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
15. Which of the following refers to two or more computers sharing information, software,
peripheral devices, and processing power?
A. Cold
site
B. Networ
k
C. Rootk
it
D. Cach
e
16. Which of the following best defines an infrastructure which allocates the information and
processing power of IT systems via a network?
A. Layered
infrastructure
B. Critical
infrastructure
C. Tiered
infrastructure
D. Distributed
infrastructure
17. Which of the following is known as the first true network infrastructure?
A. n-tiered
infrastructure
B. Critical
infrastructure
C. Layered
infrastructure
D. Distributed
infrastructure
28
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
18. Which of the following is an advantage of a distributed infrastructure?
A. It allows only specific locations within an infrastructure to share information and
applications.
B. It ensures that each application is stored exclusively in one location to ensure
information security.
C. It can allocate its processing activity to a location where it can most
efficiently be done.
D. It divides an IT system into different tiers where each part performs a
specific function.
19. How does a distributed infrastructure improve performance?
A. By storing the same application in two or more
locations
B. By assigning its processing activity to one specific
location
C. By creating information silos in disparate
locations
D. By partitioning an IT system into
different tiers
20. Which of the following is true of a client/server infrastructure?
A. It starts with a basic 3-tier model and expands on it to allow
scalability.
B. It has several layers and each layer undertakes a
specific task.
C. It reduces the load placed on the network capacity and ensures
efficiency.
D. It centralizes processing and storage for all information on
a server.
21. Which of the following is a form of distributed infrastructure?
A. 3-tier
infrastructure
B. Client/server
infrastructure
C. n-tier
infrastructure
D. Critical
infrastructure
29
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
22. A client/server infrastructure offloads the application programs and information from the
____.
A. mainfra
me
B. serve
r
C. CPU
D. por
t
23. Which of the following is a disadvantage of a client/server infrastructure?
A. It places a heavy load on the network
capacity.
B. It overloads the server with application
programs.
C. It allows processing to occur at only one client
location.
D. It transfers information between servers and clients at a
slow pace.
24. Which of the following is a typical component of a client/server infrastructure?
A. DBM
S
B. Web
analytics
C. Web
browser
D. Hot
site
25. In which of the following infrastructures is the IT system partitioned into layers?
A. Client/serv
er
B. Tiere
d
C. Distribut
ed
D. Critic
al
30
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
26. A tiered infrastructure is also known as ____.
A. distributed
infrastructure
B. client/server
infrastructure
C. critical
infrastructure
D. layer
infrastructure
27. A _____ can be defined as one of two or more rows, levels, or ranks arranged one above
another.
A. benchma
rk
B. cel
l
C. ran
k
D. tie
r
28. Which of the following is true of tiered infrastructure?
A. It has multiple layers, each performing a specific type of
functionality.
B. It has evolved from n-tier to 3-tier
infrastructure.
C. It is a form of peer-to-peer
infrastructure.
D. It has an n-tier infrastructure which is the most
basic set up.
31
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
29. Which of the following is the most basic setup of a tiered infrastructure?
A. 1-tier
infrastructure
B. 2-tier
infrastructure
C. 3-tier
infrastructure
D. n-tier
infrastructure
30. Which of the following is an example of a 1-tier infrastructure?
A. Web
browsers
B. Word
processors
C. Database management
systems
D. Intran
et
31. Which of the following is a type of tiered infrastructure which refers to the basic client/server
relationship?
A. 1-tier
infrastructure
B. 2-tier
infrastructure
C. 3-tier
infrastructure
D. n-tier
infrastructure
32
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
32. In the _____ infrastructure, the client handles the display and the server handles the
request.
A. 1-tier
infrastructure
B. 2-tier
infrastructure
C. x-tier
infrastructure
D. n-tier
infrastructure
33. Which of the following is true of a 2-tier infrastructure?
A. It has an application tier which is contained on one or both of the
two tiers.
B. It is the most basic setup of a tiered
infrastructure.
C. It balances the work of the network over several different
servers.
D. It starts with a basic n-tier model and expands on it for more
benefits.
34. Which of the following is an example of a 3-tier infrastructure?
A. Word
processor
B. PowerPoin
t
C. Web
browser
D. Spreadshe
et
33
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
35. A(n) _____ infrastructure is the most common approach used for Web applications today.
A. 1tier
B. 2tier
C. 3tier
D. ntier
36. A(n) _____ infrastructure starts with a basic 3-tier model and expands on it to allow for
greater performance, scalability, and a host of other benefits.
A. 1tier
B. 2tier
C. xtier
D. ntier
37. A(n) _____ infrastructure balances the work of the network over several different servers.
A. 1tier
B. 2tier
C. 3tier
D. ntier
34
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
38. _____ is a delivery model for software which provides the ability to customize data entry
forms, screens, reports, and the like, and access to software development tools to alter the
way in which the software works by adding new modules (services) and/or making
modifications to existing modules.
A. Iaa
S
B. Saa
S
C. SL
A
D. PaaS
39. _____ involves using the cloud for a vast majority of your computing needs.
A. Iaa
S
B. Saa
S
C. SL
A
D. PaaS
40. Which of the following is true of cloud computing?
A. It does not offer pay-per-use options and increases a firm's capital
expenditures.
B. It raises barriers to entry in markets that require an investment in
technology.
C. It gives immediate access to a broad range of application
software.
D. It is a risk-free alternative to acquiring physical computing
infrastructure.
35
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
41. Which of the following is a process of continuously measuring system results and comparing
those results to baseline values that a system seeks to attain?
A. Interoperabil
ity
B. Benchmarki
ng
C. Business continuity
planning
D. Crowdsourci
ng
42. Accuracy, an infrastructure-centric metric, is usually measured inversely as ____.
A. error
rate
B. downti
me
C. throughp
ut
D. abandon
rate
43. Which of the following is often associated with bandwidth such as transmission speeds
expressed as kilobits per second and megabits per second?
A. Throughp
ut
B. Response
time
C. Clickthrough
D. Total
hits
36
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
44. EasyBuy.com is an online retailer that sells books and magazines at half-price. They recently
found out that due to the huge amounts of traffic that Web site receives, most users are
unable to access the site when they want to and, when they do, the pages load very slowly.
This is driving customers away to other rival online bookstores. This is an example of which
of the following infrastructure-centric metrics?
A. Abandon
rate
B. System
availability
C. Error
rate
D. Time service
factor
45. The Twitter "Fail Whale" is a common sight for most users of the micro blogging site. This
error message appears whenever the system is over capacity and users cannot access their
accounts or the pages of other Twitter users. Thus, the "Fail Whale" is indicative of Twitter's
____.
A. transaction
speed
B. abandon
rate
C. response
time
D. downti
me
46. An online publication regularly checks the articles turned in by its writers for plagiarism. To
do this, it utilizes an online plagiarism checker called CopyTheft. All the user needs to do is
upload the file to the software and within 20 seconds, the system generates a report which
highlights the various instances of plagiarized work, if any. This is an example of which of
the following infrastructure-centric metrics?
A. Conversion
rate
B. Response
time
C. Time service
factor
D. Downti
me
37
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
47. Future Travels, a travel Web site, recently started advertising extensively about their travel
services. Due to this, they have had an enormous increase in online traffic to their Web site.
The company is now in the process of determining how well the current infrastructure can
handle the increased flow of visitors to the site and the additional infrastructure
requirements that will be needed in order to provide uninterrupted services to customers.
The firm is measuring the _____ of its existing system.
A. response
time
B. conversion
rate
C. scalabili
ty
D. accurac
y
48. The marketing department of Ebony, a new hotel chain, needs to determine the number of
people who visited the company's Web site over the last two months. Which of the following
metrics should the department use?
A. Unique
visitors
B. Total
hits
C. Conversion
rate
D. Page
exposures
49. Shoe Mart is an online shopping Web site which offers a range of footwear. Through an
analysis of its online data, the company recently determined that only 25 percent of all the
visitors to the Web site actually ended up placing an order and completing the online
transaction. Which of the following metrics did the company most likely use?
A. Unique
visitors
B. Conversion
rate
C. Clickthrough
D. Cost-perthousand
38
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
50. Harriet, a patisserie maker, recently advertised her services on a popular event
management company Web site. After the holiday season, she wanted to know whether the
advertisement generated sufficient traffic to her own Web site. Which of the following
metrics will help determine this?
A. Conversion
rate
B. Total
hits
C. Unique
visitors
D. Clickthrough
51. Orbit Bank is planning to host a marathon, the proceeds from which will be donated to
charities for underprivileged children. Interested participants need to visit the bank's Web
site and fill in their details for the event. The organizers of the event, however, noticed that
a large number of people who visited the site to provide their details, quit the process half
way. Which of the following metrics did the bank most likely use to arrive at such a finding?
A. Clickthrough
B. Abandoned
registrations
C. Page
exposures
D. Total
hits
52. John is a process manager at a call center for a telecom company. Lately, he has been
receiving negative feedback from customers about the prolonged amount of time taken to
answer their calls. To understand this better, John studied certain metrics, one of which
indicated that over 85 percent of all customers ended up hanging up the phone when no
one answered their calls. Which of the following call center metrics did John use?
A. Downti
me
B. Error
rate
C. Time service
factor
D. Abandon
rate
39
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
53. Delore, a company that manufactures home appliances, has set a target of increasing its
customer satisfaction levels by 15 percent. To achieve this, they aim to increase the
efficiency levels of their call center executives. They know that, on average, customers who
contact the call center for assistance, have to hold the line for over 60 seconds before being
connected to a representative. The company strives to bring this down to 20 seconds to
show their customers that they value their time. Which of the following call center metrics is
the company using?
A. AS
A
B. FCR
C. CPM
D. SL
A
54. The managers at Synopsis Telecom recently analyzed the efficiency and productivity levels
of their call center executives. Their findings showed that 50 percent of all calls were
answered within 30 seconds, 40 percent within 60 seconds, and 10 percent within 90
seconds. Which of the following metrics is the company using?
A. Abandon
rate
B. Transaction
time
C. Response
time
D. Time service
factor
55. The managers at Synopsis Telecom recently analyzed the efficiency and productivity levels
of their call center executives. They were pleased to find that 85 percent of all customer
complaints and queries were answered by executives during the initial call, without the
customers having to call back. Which of the following call center metrics did the managers
most likely use?
A. Time service
factor
B. Average speed to
answer
C. First call
resolution
D. Transaction
speed
40
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
56. GenTech, a software company, is situated in Tokyo, Japan. Given that the country is prone to
several earthquakes, GenTech is keen to build a back-up plan which will guide the company
on how to recover should disaster strike. Which of the following will help the company in this
regard?
A. Enterprise resource
plan
B. Business continuity
plan
C. Operational
plan
D. Annual growth
plan
57. Morrison and Sons, a financial firm, is developing a business continuity plan. The firm has
already compiled a list of the various potential threats to the organization and its assets and
is now in the process of identifying the impact each these threats would have on the
business's operations, should they come to fruition. The company is in which phase of
business continuity planning?
A. Maintenan
ce
B. Analysi
s
C. Desig
n
D. Implementati
on
58. The management at Solitaire Inc. is building a business continuity plan and has identified its
core, critical, and noncritical IT applications. Each of these applications have been
categorized on the basis of their estimated recovery costs and the affect the loss of these
applications will have on the firm's business The company is in which phase of business
continuity planning?
A. Testin
g
B. Desig
n
C. Analysi
s
D. Implementati
on
41
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
59. Which of the following refers to an area available to a company that rents space and
telecommunications equipment from another company?
A. Collocation
facility
B. Hot
site
C. Virtual
environment
D. Cold
site
60. The _____ phase of the business continuity plan involves using the requirement recovery
document to develop a formal, technical, and detailed plan for recovering from a disaster.
A. analysi
s
B. testin
g
C. maintenan
ce
D. desig
n
61. Which of the following phases of the business continuity plan involves executing simulated
scenarios of disasters and having employees execute on a disaster recovery plan?
A. Maintenan
ce
B. Implementati
on
C. Testin
g
D. Desig
n
42
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
62. What is the last phase of the business continuity planning process?
A. Implementati
on
B. Maintenan
ce
C. Desig
n
D. Testin
g
True / False Questions
63. An organization with an SOA philosophy reacts proactively to perceived changes in the
market.
True
False
64. SOA places several structural constraints on an organization.
True
False
65. An IT-enabled SOA philosophy allows your organization to provide customers with multichannel service delivery options and customizable products and services.
True
False
66. In terms of information needs, a company with a service-oriented architecture philosophy
would focus on business intelligence and integrated information.
True
False
67. An ERP system in an SOA should prevent interoperability among multiple vendors.
True
False
68. Ajax and WSDL are some of the infrastructure platforms that do not support a serviceoriented architecture approach.
True
False
69. Infrastructure is the most important organizational resource that a service-oriented
architecture philosophy leverages.
True
False
43
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
70. An SOA approach to information requires duplicate information to be maintained in silos in
an organization.
True
False
71. An SOA approach to information requires that information be available in multiple formats in
order to support interoperability.
True
False
72. In a corporation, the IT infrastructure should enable people, processes, and customers to
interact and perform their tasks.
True
False
73. An example of a client/server infrastructure would be a person surfing the Internet.
True
False
74. The concept of a tiered infrastructure has developed from 1-tier to n-tiers.
True
False
75. In a client/server infrastructure, the functions of an information system are divided among
computers on a network while centralizing processing and storage for all information on a
server.
True
False
76. A major drawback of the client/server infrastructure is that it does not have the capacity to
offload application programs and information from the server.
True
False
77. An n-infrastructure is one which has a single tier on a single machine.
True
False
78. The objective of cloud computing is to have one's computing costs align with the activity
level of one's organization.
True
False
79. Software as a service (SaaS) is a delivery model for software in which one buys low quality
software for basic software needs.
True
False
44
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
80. The infrastructure-as-a-service model maximizes one's capital investment in technology.
True
False
81. A service level agreement (SLA) is provided by one's cloud service provider.
True
False
82. A private cloud is one which exists on the Internet but is not available to all Internet users.
True
False
83. A disadvantage of cloud computing is that it increases barriers to entry in markets that
require a significant investment in technology.
True
False
84. Benchmarks are often industry-specific, process specific, generated internal to one's
organization, or a combination of the three.
True
False
85. Throughput, transaction speed, and accuracy are infrastructure-centric metrics.
True
False
86. Throughput is often associated with telecommunication capabilities such as transmission
speed.
True
False
87. System availability includes regularly scheduled maintenance time.
True
False
88. Effectiveness metrics calculate results of technologies or applications in an environment.
True
False
89. Number of stockouts and excess inventory are supply chain management metrics.
True
False
90. As a Web-centric metric, total hits does not include the number of visits to a Web site made
by the same user.
True
False
45
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
91. Abandoned shopping carts is a Web-centric metric which refers to the number of visitors
who pay for merchandise before abandoning a shopping cart.
True
False
92. A business continuity plan starts with the design phase.
True
False
93. A disaster recovery cost curve charts the cost to your organization of the unavailability of
information and technology.
True
False
94. In business continuity planning, one must test the disaster recovery plan before
implementing it.
True
False
46
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
Chapter 08
Protecting People and Information: Threats and Safeguards
Multiple Choice Questions
1. Which of the following is an example of the unethical use of computers?
A. Employees failing to answer a large number of e-mail messages due to
network problems.
B. Employees searching organizational databases for information on
celebrities and friends.
C. Employees sending messages without spell checking and
proofreading them.
D. Employees updating their passwords at the end of
every month.
2. Which of the following is true of an ethical dilemma?
A. It is faced exclusively by unethical, immoral
people.
B. It occurs when one's responsibilities seem to lead in
opposite directions.
C. It is the choice of whether or not to act
ethically.
D. It involves choosing between compatible good
outcomes.
3. _____ can be defined as the principles and standards that guide our behavior toward other
people.
A. Ethi
cs
B. Model
s
C. Eugenic
s
D. Aestheti
cs
4. Which of the following is true of ethics and ethical people?
A. Ethical people do not face ethical dilemmas since they know the difference between
right and wrong.
B. Ethical people's values are free from the influence of their history, culture,
and religion.
C. Ethical norms change radically because of society's
dynamic nature.
D. Acting ethically means behaving in a principled fashion and
treating others with dignity.
47
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
5. David works as process supervisor at an industrial plant. In his company, he is known by all
his colleagues and superiors as an honest worker whose decisions are always guided by
ethical values. Recently, David came to know that due to the irresponsible disposal of
company waste, the local groundwater has been contaminated. Because of this, a large
number of people living in close proximity to the plant have been suffering from severe
ailments. However, in spite of knowing this, David does not take any action. Which of the
following, if true, most likely explains David's decision not to act?
A. David's decision was guided by morality and ethical
values.
B. David considered the impact of toxins on the environment while making
the decision.
C. David's decision was influenced by the dilemma of losing
his job at the plant.
D. David made the decision by considering the well-being of the people living in close
proximity to the plant.
6. Which of the following is part of the outermost level of an individual's ethical structure?
A. Actions that are considered serious ethical violations by both society
and oneself.
B. Behavior that causes extreme ethical discomfort to the
person.
C. Behavior that calls for stringent measures against the
person.
D. Actions that most people would not consider
unacceptable or unethical.
7. Among the three levels of an individual's ethical structure, the _____ level involves things
that most people would not consider bad, such as taking a couple of paper clips or sending
an occasional personal e-mail on company time.
A. innermo
st
B. outerm
ost
C. secon
d
D. middl
e
8. Which of the following is part of the innermost level of an individual's ethical structure?
A. Ethical violations that one would consider
extremely serious.
B. Ethical behavior that a society considers
acceptable.
C. Behavior that does not call for action against the
person.
D. Actions that seem acceptable to one's values and
morals.
48
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
9. Among the three levels of an individual's ethical structure, the _____ level involves ethical
violations that one would consider very serious, such as embezzling funds or selling
company records to a competitor.
A. innerm
ost
B. outermo
st
C. extern
al
D. middl
e
10. Michelle works as an engineer at a software firm and often checks her personal e-mail while
at work. Due to the long hours she puts in at the office, she does not have any time to check
her e-mail at home and hence, feels that her actions are acceptable. Michelle's behavior
relates to which of the following levels of her ethical structure?
A. Innermo
st
B. Outerm
ost
C. Insid
e
D. Middl
e
11. Palmer Inc. recently found out that a senior researcher at the company, Jessica Hughes, has
been selling the firm's trade secrets to a leading competitor. Though Jessica knew that her
actions would result in serious consequences, she went ahead and shared the confidential
information with the rival firm. Jessica's behavior relates to which of the following levels of
her ethical structure?
A. Innerm
ost
B. Extern
al
C. Outermo
st
D. Middl
e
49
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
12. An assessment of what is right or wrong can be determined by considering ____, which can
be understood as the benefit or harm that will come from a particular decision.
A. the
consequences
B. society's
opinion
C. the time till the consequences take
effect
D. the reach of the
result
13. Peter works as a quality inspection officer at a coffee factory. Due to personal obligations, he
needs to leave work early one day, because of which certain consignments will be shipped
without any quality checks. Peter is now thinking about the actions that the company will
take against him if they find out about it. Which of the following is Peter considering before
making his decision?
A. Reach of
result
B. Relatedne
ss
C. Time to
consequences
D. Consequen
ces
14. The management at Belle Cosmetics, a company headquartered in Jakarta, is contemplating
whether or not to use palm oil extracts for their hair products. Though the extracts are
proven to nourish hair, using palm oil for commercial products is a major cause of
deforestation in Indonesia. They feel that using palm oil extracts will make their customers
shift their loyalties to other brands. Which of the following considerations is the company
taking into account while making their decision?
A. Likelihood of
effect
B. Relatedne
ss
C. Society's
opinion
D. Time to
consequences
50
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
15. Kelly, who works at an advertising firm, regularly receives calls from friends and family
during office hours. Though she knows that it is not right on her part to spend a lot of time
answering personal calls, she feels that the management will not take any strict action
against her because she always meets project deadlines and provides quality work. Which of
the following is Kelly considering while making her decision to continue taking calls?
A. Time to
consequences
B. Likelihood of
effect
C. Relatedne
ss
D. Reach of
result
16. An assessment of what is right or wrong can be determined by considering ____, which
refers to the probability that the harm or benefit will occur if one undertakes an action.
A. the likelihood of
effect
B. society's
opinion
C. the time to
consequences
D. relatedne
ss
17. An assessment of what is right or wrong can be determined by considering the ____, which
may be defined as how long it will take for the benefit or harm to take effect.
A. likelihood of
effect
B. reach of
result
C. time to
consequences
D. consequenc
es
18. _____ refers to the extent to which one identifies with the person or persons who will receive
the benefit or suffer the harm associated with a particular decision.
A. Reach of
result
B. Tangibilit
y
C. Likelihood of
effect
D. Relatedn
ess
51
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
19. An assessment of what is right or wrong can be made by considering _____ which focuses on
the number of people that will be affected by one's action.
A. society's
opinion
B. the
consequences
C. the likelihood of
effect
D. the reach of
result
20. The management at Corpus Inc. is weighing the pros and cons of moving their factory from
Michigan to Vermont. They know that the move will lower their operating costs, however,
they are also aware that several of their factory workers will be left without a job because of
their inability to relocate. Which of the following considerations is the company taking into
account while making their decision?
A. Time to
consequences
B. Reach of
result
C. Cause
s
D. Society's
opinion
21. The software development team at Magnus Corporation recently created a unique mobile
application that helps users locate themselves anywhere on the globe. In addition, the
software provides information on traffic jams, fueling stations, restaurants, and hotels. This
is an example of ____.
A. public
property
B. intellectual
property
C. real
property
D. personal
property
22. _____ refers to intangible creative work that is embodied in physical form.
A. Real
property
B. Public
property
C. Intellectual
property
D. Immovable
property
52
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
23. An architectural firm's blueprints, sketches and other proprietary documents are examples
of ____.
A. public
property
B. intellectual
property
C. real
property
D. immovable
property
24. Katherine Wood, a critically acclaimed feminist poet, recently published her second
anthology of poetry. Which of the following will protect her work from being used by other
people without her permission?
A. Copyright
law
B. Patent
law
C. Trademark
law
D. Fair
use
25. A _____ refers to the legal protection offered for the expression of an idea, such as a song,
video game, and some types of proprietary documents.
A. copyri
ght
B. tradema
rk
C. pate
nt
D. fair use
agreement
26. The _____ says that you may use copyrighted material in certain situations, for example, in
the creation of new work or, within certain limits, for teaching purposes.
A. Fair Use
Doctrine
B. First-Sale
Doctrine
C. Orphan work
rule
D. Open-source
rule
53
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
27. Jeanne Sanders, a celebrity chef, recently published a book titled "Easy to Bake Cakes and
Pastries." However, in spite of copyrighting her work, James Riley, a critic with News Today,
used some excerpts from her book for his news article. Jeanne is upset and consults her
lawyer who tells her that, according to law, James has the right to use excerpts from her
book and has not violated any laws. This is an example of ____.
A. a Creative Commons
license
B. the open-source
rule
C. the Fair Use
Doctrine
D. the First-Sale
doctrine
28. Alice recently prepared a report on the impact of climate change on developing countries.
While writing her report, she referred to several online articles and took excerpts from them.
Which of the following should Alice provide in the report to indicate that these excerpts are
not her original work?
A. Annotatio
ns
B. Citatio
ns
C. Watermar
ks
D. Inscriptio
ns
29. _____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.
A. Pirated
software
B. File
sharing
C. Torrent
poisoning
D. Phishin
g
54
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
30. Sarah recently downloaded a few songs by her favorite artist a month before the artist's
album was released. After downloading the songs, she distributed them to all her friends.
Which of the following is Sarah doing?
A. Spammin
g
B. Phishin
g
C. Pirati
ng
D. Spoofin
g
31. _____ is the right to be left alone when one wants to be, to have control over one's own
personal possessions, and not to be observed without one's consent.
A. Nondisclosure
B. Intellectual
property
C. Personalizati
on
D. Priva
cy
32. _____ refers to programs that Web sites offer to help people monitor what is happening on a
computer.
A. Abandonwa
re
B. Snoopw
are
C. Freewar
e
D. Sharewar
e
33. Claytons and Sons, a finance firm in Manhattan, has a large number of employees who
handle huge amounts of online transactions everyday. The management feels that it is
crucial to monitor their online activities. Which of the following can the company use for this
purpose?
A. Snoopw
are
B. Sneakwar
e
C. Spywar
e
D. Stealthwa
re
55
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
34. Which of the following is a program that, when installed on a computer, records every
mouse click?
A. Honeyp
ot
B. Spear
phishing
C. Clickstreami
ng
D. Key
logger
35. Starlit Corporation recently had an incident where one of their employees sent out
confidential information to a competitor. The company has now decided to use a certain
software which tracks their employees' online activities based on their mouse clicks. Which
of the following is the company most likely planning to use?
A. Spear
phishing
B. Spywar
e
C. Key trapper
software
D. Clickstrea
m
36. Janice works in the IT department of a multinational bank and is responsible for monitoring
information that is being transmitted over a digital network. This helps her ensure that there
is no breach in security. Which of the following is Janice most likely using?
A. Spywar
e
B. Key
logger
C. Packet
sniffer
D. Rootk
it
37. _____ refer(s) to devices on networks that connect computers to each other.
A. Packet
sniffers
B. Route
rs
C. Adwar
e
D. Modem
s
56
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
38. _____ is a kind of identity theft where the victim knows the person who stole his/her identity.
A. Friendly
fraud
B. PayPa
l
C. Peer-to-peer
computing
D. Pretextin
g
39. _____ is a technique to gain personal information for the purpose of identity theft, usually by
means of fraudulent e-mail.
A. Greylisti
ng
B. Phishi
ng
C. Sniffin
g
D. Wire
fraud
40. Ashley recently received an e-mail from a bank asking for her account number and
verification of her password. The e-mail contained the bank's logo and was signed by the
branch manager. She immediately replied to the e-mail, providing the requested details.
However, a few days later, she noticed that her bank statement showed a zero balance. On
checking with the bank authorities, she was told that the e-mail was not sent by them.
Ashley was most likely a victim of which of the following types of fraud?
A. Brand
spoofing
B. Key
logging
C. Piratin
g
D. Pharmin
g
41. _____ is a technique to gain personal information for the purpose of identity theft, where
specific individuals are targeted and the creator of a fraudulent e-mail already has some of
the victim's personal information and wants more.
A. Spear
phishing
B. Vishin
g
C. Spyphishing
D. Pharmin
g
57
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
42. _____ is the use of phishing targeted at senior business executives, government leaders, and
other types of high-profile individuals.
A. Spammin
g
B. Whali
ng
C. Vishin
g
D. Keystroke
logging
43. Which of the following should a person do to protect their personal information?
A. Avoid using special characters in
passwords.
B. Do not provide information to people who contact
you by e-mail.
C. Avoid providing answers that are hard to guess as responses to security
questions.
D. Do not enter those Web sites where https:// appears in the Web
browser.
44. The most recent federal bill that addressed electronic monitoring of employees is the ____.
A. Homeland Security Act of
2002
B. Electronic Communications Privacy
Act of 1986
C. Sarbanes-Oxley Act of
2002
D. USA Patriot Act of
2003
45. A _____ is a small file that contains information about a person and his/her Web activities,
which a Web site one visits places on their computer.
A. cook
ie
B. bo
t
C. cach
e
D. key
logger
58
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
46. _____ refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods
and services.
A. Adwar
e
B. Spywar
e
C. Pharmin
g
D. Spa
m
47. Jennifer recently installed a free media player for downloading music onto her laptop.
Without her knowledge, along with the media player, a software was installed on her system
which constantly tracked her online activities in addition to the data saved on her laptop.
Which of the following was most likely downloaded without Jennifer's knowledge?
A. Adwar
e
B. Spywa
re
C. Firmwar
e
D. Cooki
e
((
48. _____ refers to software that generates advertisements and installs itself on your computer
when you download some other, usually free, program from the Web.
A. Antivirus
software
B. Adwa
re
C. Spywar
e
D. AdSens
e
49. _____ refers to malicious software that collects information about a person and his/her
computer and reports it to someone without their permission.
A. Firmwar
e
B. Spywa
re
C. Adwar
e
D. Spa
m
59
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
50. Spyware is also known as ____.
A. adwar
e
B. malwar
e
C. stealthw
are
D. firmwar
e
51. A _____ consists of one line of information for every visitor to a Web site and is usually stored
on a Web server.
A. Web
log
B. firewa
ll
C. cooki
e
D. copyrig
ht
52. A _____ records information about you during a Web surfing session such as what Web sites
you visited, how long you were there, what ads you looked at, and what you bought.
A. copyrig
ht
B. key
logger
C. firewa
ll
D. clickstre
am
53. The _____ allows law enforcement to get access to almost any information, including library
records, video rentals, bookstore purchases, and business records when investigating any
act of terrorism or hostile intelligence activities.
A. USA Patriot
Act
B. Sarbanes-Oxley
Act
C. CAN-Spam
Act
D. Homeland Security
Act
60
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
54. The _____ sought to protect investors by improving the accuracy and reliability of corporate
disclosures and requires companies to implement extensive and detailed policies to prevent
illegal activity within the company and respond in a timely manner to investigate illegal
activity.
A. USA Patriot
Act
B. Homeland Security
Act
C. Sarbanes-Oxley
Act
D. Fair and Accurate Credit
Transactions Act
55. The _____ provided new authority to government agencies to mine data on individuals and
groups including e-mails and Web site visits, and put limits on the information available
under the Freedom of Information Act.
A. CAN-Spam
Act
B. Sarbanes-Oxley
Act
C. Homeland
Security Act
D. USA Patriot
Act
56. The _____ sought to regulate interstate commerce by imposing limitations and penalties on
businesses sending unsolicited e-mail to consumers.
A. USA Patriot
Act
B. Identity Theft and Assumption
Deterrence Act
C. Homeland Security
Act
D. CAN-Spam
Act
57. _____ are types of hackers who break into other people's computer systems and may just
look around. They may steal credit card numbers or destroy information, or otherwise do
damage.
A. Zombie
s
B. White-hat
hackers
C. Black-hat
hackers
D. Drone
s
61
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
58. _____ have philosophical and political reasons for breaking into systems and often deface
Web sites as a sign of protest.
A. Zombie
s
B. White-hat
hackers
C. Hacktivi
sts
D. Screenage
rs
59. A _____ floods a server or network with so many requests for service that it slows down or
crashes.
A. rootk
it
B. denial-of-service
attack
C. wi
ki
D. Trojan
horse
60. A(n) ______ is hardware and/or software that protects a computer or a network from
intruders.
A. Web
log
B. wor
m
C. firew
all
D. public
key
61. _____ refers to the use of physiological characteristics such as fingerprints, the blood vessels
in the iris of the eye, and the sound of one's voice to provide identification.
A. Pharmin
g
B. Biometr
ics
C. Intellectual
property
D. Whalin
g
62
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
62. _____ is a way of protecting messages and files by scrambling the contents of a file so that
one cannot read it without having the right key.
A. Encrypti
on
B. Feature
creep
C. Biometri
cs
D. Encapsulati
on
True / False Questions
63. An ethical dilemma refers to the choice of whether or not to be ethical.
True False
64. Intellectual property is defined as the principles and standards that guide our behavior
toward other people.
True False
65. A factor that affects how one makes a decision when faced with an ethical dilemma is one's
basic ethical structure, which develops as one grows up.
True False
66. Intellectual property refers to tangible creative work that is embodied in non-physical form.
True False
67. Copyright law completely forbids the use of intellectual property.
True False
68. In the United States, making a copy of copyrighted software for backup purposes amounts
to software piracy.
True False
69. In order to monitor computer use, screen capture programs can be used to capture every
single screen that a user views.
True False
70. Log analysis is a monitoring tool that keeps track of logons, deletions, and so forth.
True False
71. Identity theft is often for financial gain, and the stolen identity is used to apply for and use
credit cards in the victim's name or to apply for loans.
True False
72. Phishing is a technique which delays incoming e-mail messages for a long period of time to
defend one's computer against viruses and worms.
True False
63
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
73. Key logging refers to the rerouting of a person's request for a legitimate Web site to a fake
site which then collects information from the person.
True False
74. Pharming is accomplished by getting access to the giant databases that Internet providers
use to route Web traffic.
True False
75. A reason that companies monitor employees' e-mail is that they can be sued for what their
employees send to each other and to people outside the company.
True False
76. A hardware key logger cannot capture backspaces and deletions.
True False
77. A unique cookie is one that started out as a common cookie, but the original site sold access
to it to a third party.
True False
78. One way to block cookies is to set one's browser to accept or reject all cookies.
True False
79. Spammers can penetrate through spam filters by including nonprinting characters in their
subject lines.
True False
80. The CAN-Spam Act is an anti-spam law passed by the Federal Government which bans
spamming entirely.
True False
81. Adware is software to generate ads that installs itself on your computer when you download
some other program from the Web.
True False
82. Spyware is a kind of software that blocks malicious software from entering one's computer.
True False
83. Without spyware, a Web site cannot tell a lot about its Web visitors.
True False
84. Anonymous Web browsing (AWB) services help in hiding a person's identity from the Web
sites one visits.
True False
85. The Homeland Security Act of 2002 sought to protect investors by improving the accuracy
and reliability of corporate disclosures.
True False
86. Hackers who have a philosophical or political message that they want to share are called
hacktivists.
True False
64
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
87. Black-hat hackers are known as the "good guys" who test the vulnerability of systems so
that protective measures may be taken.
True False
88. A virus is software that is written with malicious intent to cause annoyance or damage.
True False
89. Benign viruses are the worst kinds of viruses as they have the capacity to damage
computers.
True False
90. Script kiddies work at the request of the owners of computer systems, find vulnerabilities in
systems, and plug the holes.
True False
91. The objective of a denial-of-service attack is to prevent legitimate customers from accessing
the target site.
True False
92. A virus has the capacity to hurt the processor of a computer.
True False
93. A drawback of spam protection is that it may mark something as spam when it is not.
True False
94. Anti-phishing software protects a person from identity theft.
True False
95. A firewall examines each message as it seeks entrance to the network.
True False
65
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
Chapter 09
Emerging Trends and Technologies: Business, People, and Technology Tomorrow
Multiple Choice Questions
1. Which of the following is true of personal software-as-a-service (personal SaaS)?
A. It involves the purchase of high quality, productivity
software.
B. It is cost effective because it provides discounted rates on personal
productivity software.
C. It involves paying for personal productivity software on a
pay-per-use basis.
D. It ensures high levels of security as all data is stored directly on a user's
personal computer.
2. Which of the following is a drawback of personal software-as-a-service (personal SaaS)?
A. It provides customers with limited options for purchasing different types
of software.
B. It does not ensure high levels of privacy as data is maintained on a
Web-based server.
C. It is an expensive proposition for most customers as software licenses involve
high costs.
D. It hosts the software and related data offline and hence, cannot be
accessed online.
3. Which of the following is a delivery model that enables a person to rent productivity
software such as Microsoft Office?
A. F2b2
C
B. Push
technology
C. Personal
SaaS
D. VoIP
66
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
4. Johanna works for a child rights organization and is required to travel during the first quarter
of the year to different underdeveloped countries. Her role is to visit the different country
offices to help define project goals, brainstorm fundraising ideas, and realize the scope of
projects at the onset of campaigns. For these sessions, she uses a mind mapping software.
She prefers to rent the software prior to her travel instead of purchasing it, since she needs
it only for a few months of the year. Which of the following is most likely being used by
Johanna?
A. Personal
SaaS
B. F2b2
C
C. Push
technology
D. VoIP
5. Which of the following is an advantage of personal software-as-a-service (personal SaaS)?
A. It represents a cost effective solution
for most users.
B. It offers customers a wide range of options to purchase
software.
C. It ensures high levels of information security by storing data on users' personal
computers.
D. It guarantees reliability as the risk of network outages is
minimal.
6. Which of the following refers to an environment in which businesses and organizations come
to customers via technology with information, services, and product offerings based on their
profiles?
A. Open source
technology
B. Push
technology
C. F2b2
C
D. Pull
technology
7. Which of the following is an example of push technology?
A. Web sites that feature pop-up advertisements to increase the number of
online visitors.
B. Retail companies that use Internet media to promote the sale of newly
launched products.
C. Travel Web sites that e-mail holiday offers to customers based on their
membership profiles.
D. Newly-established companies that use mass e-mails to build a large
customer base.
67
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
8. Abigail, a corporate lawyer, pursues art as a hobby in her spare time. Recently, she started
maintaining a blog in which she regularly writes about her favourite artists, types of art, and
any art works that she has purchased. Since then, she has started receiving updates via email and text message about art events based on her tastes and preferences. This is an
example of ____.
A. personal
SaaS
B. F2b2
C
C. push
technology
D. VoIP
9. Which of the following is true of push technology?
A. Databases and data warehouses affect the development of
push technologies.
B. Users request for information from a program or computer via a
Web browser.
C. Businesses send mass e-mails to customers about products that are mostly of no
use to them.
D. Companies push products to customers without knowing their
preferences.
10. Which of the following is an e-commerce business model in which a consumer
communicates through a business on the Internet, and directly provides product
specifications to a factory that produces the product and ships it directly to the consumer?
A. F2b2
C
B. Push
technology
C. Personal
SaaS
D. VoIP
68
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
11. Dell Inc., the multinational IT corporation that manufactures computers and related
products, pioneered the direct selling model, wherein customers could customize their PCs
by placing orders online along with their product specifications. Dell would then
manufacture the computers according to customers' requirements and subsequently ship
the product directly to them. This is an example of which of the following e-commerce
business models?
A. G2
C
B. C2
C
C. B2
B
D. F2b2
C
12. iTunes, Apple's online music store, allows users across the globe to download music, videos,
games, audiobooks, podcasts, and other forms of digital content, all at the push of a button.
Effectively, iTunes allowed users to bypass traditional channels such as music stores and
other retailers that would normally distributes such products. This is an example of ____.
A. push
technology
B. personal
SaaS
C. disintermedi
ation
D. F2b2
C
13. An example of _____ would be the travel industry where the Internet connects customers
directly to an airline to purchase tickets and travel agents no longer play an important role
in the process.
A. crowdsourci
ng
B. differentiati
on
C. disintermedi
ation
D. encrypti
on
69
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
14. Which of the following best defines disintermediation?
A. The use of the Internet as a delivery vehicle whereby middle men in a
distribution channel can be bypassed
B. The process of using predictive analysis to strengthen the role of intermediate players in a
distribution process
C. The enlisting of people (i.e., crowds)—instead of designated paid employees—to create,
modify, and oversee the development of a product or service
D. The transmission of voice communications over the Internet in order to avoid
toll charges
15. Which of the following allows you to send voice communications over the Internet and avoid
the toll charges that you would normally receive from your long distance carrier?
A. VPN
B. Saa
S
C. F2b2
C
D. VoI
P
16. Sally who lives in New Jersey needs to constantly be in touch with her husband who works in
Italy. She uses a certain technology which allows her to make phone calls over the Internet
and charges her a basic monthly fee for all her international calls. Which of the following is
Sally most likely to be using?
A. F2b2
C
B. Push
technology
C. VPN
D. VoI
P
17. _____ focuses on online collaboration, users as both creators and modifiers of content, and
other engaging Web-based services.
A. Web
2.0
B. VoIP
C. F2b2
C
D. CAVE
70
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
18. Which of the following focuses on semantics i.e., the ability of Internet technologies to
interpret and understand human-generated content?
A. F2b2
C
B. VoIP
C. Web
3.0
D. Web
2.0
19. Which of the following is true of Web 2.0?
A. It creates, captures, and displays images in threedimensional form.
B. It adds the sense of touch to an environment that previously had only
textual elements.
C. It views the physical world with computer-generated layers of information
added to it.
D. It focuses on dynamic and customized
information feeds.
20. Which of the following best describes the process of viewing the physical world with
computer-generated layers of information added to it?
A. Disintermediati
on
B. Augmented
reality
C. Virtual
reality
D. Feature
analysis
21. Which of the following is an example of augmented reality?
A. A person communicates through an Internet business and directly provides product
specifications to a factory that makes customized products.
B. An organization uses a retinal scanner for the purpose of employee
identification.
C. A sports broadcast of a golf tournament uses digital overlays to indicate the
yardage of the golf course.
D. An online bookstore ships products directly to shoppers thereby bypassing traditional
bookstores.
71
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
22. Lesley who recently traveled to Paris was anxious prior to her visit because it was her first
trip to the city. However, while she was in the city, she used a certain technology which
helped her find places at the click of a button. Whenever she was outdoors, she would click
a photo of the street on her palmtop and a list of museums, parks, and eateries would
automatically appear on the screen. With the help of this technology, she could easily make
her way through the city. Which of the following technologies did Lesley's palmtop utilize?
A. Augmented
reality
B. Feature
analysis
C. Push
technology
D. VoIP
23. Which of the following captures and utilizes real body characteristics, such as breadth,
voice, height, and weight to interact with a computer system?
A. F2b2
C
B. RFI
D
C. Physiological
interfaces
D. Multi-state
computing
24. The National Museum maintains the highest levels of security due to the invaluable range of
artefacts that are on display. At the entrance of each level in the museum, there is
equipment that scans the facial features of every visitor that enters the floor. This helps
them protect the artefacts by monitoring the flow of visitors in and out of the museum.
Which of the following is the museum using?
A. Physiological
interfaces
B. Artificial
intelligence
C. Extreme
programming
D. Network
interfaces
72
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
25. Which of the following is an example of a physiological innovation?
A. Optical mark
readers
B. Haptic
interfaces
C. 3G
technology
D. Image
scanners
26. Which of the following refers to a system which not only captures spoken words but also
distinguishes word groupings to form sentences?
A. Automatic speech
recognition
B. Haptic
interface
C. Biometri
cs
D. CAVE
27. Which of the following refers to a system which converts the digital signals of one's speech
into phonemes?
A. Feature
analysis
B. Language
processing
C. Pattern
classification
D. Haptic
interface
28. Which of the following refers to a system that matches one's spoken phonemes to a
phoneme sequence stored in an acoustic model database?
A. Encapsulati
on
B. Feature
analysis
C. Pattern
classification
D. Language
processing
73
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
29. Which of the following best describes a system which attempts to make sense of what a
person is saying by comparing the word phonemes generated in pattern classification with a
language model database?
A. Structured Query
Language
B. Language
processing
C. Feature
analysis
D. Voice over Internet
Protocol
30. Which of the following is undertaken by a feature analysis system?
A. Adds extra features that were not part of the initial
requirements
B. Provides identification by evaluating facial characteristics of
a person
C. Compares a person's word phonemes with a language model
database
D. Eliminates background noises and converts digital speech
signals into syllables
31. Certain cell phones provide users with the option of voice dialling. All that the user has to do
is give a command stating the name of the person they would like to call, (e.g., "Call Roger")
and the cell phone automatically dials the person's number. Which of the following
physiological innovations do such cell phones utilize?
A. VoIP
B. AS
R
C. CAVE
D. RFI
D
32. Some in-car GPS navigation systems are voice activated. All that a driver has to do is state
the name of one's destination or dictate an address and the system automatically instructs
the driver on how to get there. Which of the following physiological innovations do such GPS
systems utilize?
A. VoIP
B. CAVE
C. RFI
D
D. AS
R
74
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
33. Several airline pilots are trained in flight simulators which recreate the environment of
actual airplane cockpits. Using such technology, pilots are trained to respond to various
conditions that they might encounter while on the job, such as turbulence, engine failure,
bad weather, and the like. Flight simulators are real-world applications of ____.
A. near field
communication
B. radio frequency
identification
C. virtual
reality
D. network
interfaces
34. The most common applications of virtual reality are found in the _____ industry.
A. hospitali
ty
B. manufacturi
ng
C. trav
el
D. entertain
ment
35. Which of the following refers to a technology with a three-dimensional computer simulation
in which a person actively and physically participates?
A. Wireless
fidelity
B. Virtual
reality
C. Augmented
reality
D. Agile
methodology
36. Reuben spends most of his free time playing on his PlayStation 3 (PS3). His favorite game
"Sports Champions" includes the use of PS3's motion controller, a device which allows the
user to physically participate in a game. The PS3 Eye, a gaming camera, captures the
movements of the motion controller and displays it on the TV screen. In this scenario, the
game "Sports Champions" is using ____.
A. virtual
reality
B. open source
technology
C. wireless
fidelity
D. disintermediati
on
75
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
37. Which of the following represents a device which contains a screen that covers a user's
entire field of vision and displays various views of an environment based on the user's
movements?
A. Glov
e
B. Trackba
ll
C. Walke
r
D. Heads
et
38. Which of the following is an input device that captures and records the shape and
movement of your hand and fingers and the strength of their movements?
A. Glov
e
B. Motion
controller
C. Handheld
device
D. Trackba
ll
39. Which of the following refers to a special 3-D virtual reality room that can display images of
people and objects located in other similar environments all over the world?
A. CAV
E
B. RFI
D
C. VPN
D. Wireless
fidelity
40. Which of the following is true about a CAVE?
A. The system collaborates online data and customizes
information feeds.
B. The system matches spoken phonemes to a sequence stored in an acoustic
database.
C. Images are created, captured, and/or displayed in true threedimensional form.
D. Internet protocol sends high-quality voice messages routed through a
VoIP provider.
76
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
41. Which of the following is a holographic device?
A. Data manipulation
subsystem
B. Intrusion detection
system
C. Geographic information
system
D. Cave automatic virtual
environment
42. Which of the following uses technology to add the sense of touch to an environment that
previously only had visual and textual elements?
A. Augmented
reality
B. Haptic
interfaces
C. Holographic
devices
D. Feature
analysis
43. Touch screen cell phones have ____. This is evidenced by the vibrations that the user senses
when he or she presses a button on the screen.
A. CAVEs
B. holographic
devices
C. biometri
cs
D. haptic
interfaces
44. _____ is the use of physiological characteristics—such as your fingerprint, the blood vessels
in the iris of your eye, the sound of your voice, and even your breath—to provide
identification.
A. Biometr
ics
B. Bluetoot
h
C. Feature
analysis
D. Holographi
cs
77
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
45. Chic! is a high-end luxury boutique in Paris that is especially popular among its clientele
because of the well-fitted dresses that it offers. All that customers needs to do is decide on
the design and color of a dress and then enter a room in the store which scans their entire
body. The store then creates a dress based on the customer's exact body structure and
shape, which fits them perfectly. Which of the following is the store using?
A. Augmented
reality
B. Pattern
classification
C. Feature
analysis
D. Biometr
ics
46. Illuminas, a research firm in Moscow, maintains a high level of security due to the sensitive
research data that they handle. Certain parts of the facility have restricted access and are
accessible only to authorized personnel. To validate the identity of such personnel, the firm
uses a certain technology which scans employees' irises before granting them entry to such
areas. This is an example of which of the following aspects of personal identification?
A. What you
do
B. What you
know
C. What you
have
D. Who you
are
47. The "_____" aspect of personal identification refers to something like a password which
everyone can create and has.
A. what you
know
B. what you
do
C. what you
feel
D. who you
are
78
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
48. Which of the following can perform a variety of physiological functions when inserted into
the human body?
A. RFID
chip
B. Rootk
it
C. Bioch
ip
D. Implant
chip
49. Which of the following can be placed in the human body to store important information
about a person, such as medical history, and can be GPS-enabled to offer a method of
tracking?
A. Trackba
ll
B. Implant
chip
C. Multi-state
CPU
D. Bluetoot
h
50. Which of the following is a standard for transmitting information in the form of short-range
radio waves over distances of up to 30 feet?
A. Blueto
oth
B. WiF
i
C. NFC
D. Broadban
d
51. Melissa and her friend, Erica, go on a hike to get away from the hustle bustle of city life.
During the hike, Melissa takes several photographs with her cell phone camera and she uses
a certain technology to transfer them to Erica. However, when she tries sending them to her
friends who lives in the next city, she is unable to transfer the photographs. Which of the
following technologies is Melissa using?
A. Wik
i
B. WiF
i
C. Blueto
oth
D. NFC
79
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
52. Which of the following refers to a standard for transmitting information in the form of radio
waves over distances up to about several miles?
A. LA
N
B. Wi
Fi
C. Bluetoot
h
D. NFC
53. Which of the following refers to a wireless transmission technology developed primarily for
mobile phones to support mobile commerce and other phone activities?
A. Bluetoot
h
B. WiF
i
C. LA
N
D. NF
C
54. Which of the following uses a microchip in a tag to store information, and information is
transmitted from the tag when the microchip is exposed to the correct frequency of radio
waves?
A. CAVE
B. RFI
D
C. Saa
S
D. F2b2
C
55. With RFID technologies, each individual piece of merchandise will have a unique ____.
A. USP
B. EP
C
C. tradema
rk
D. UPC
80
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
56. Which of the following is a discipline that seeks to control matter at the atomic and subatomic levels for the purpose of building devices on the same small scale?
A. Push
technology
B. Haptic
technology
C. Nanotechnol
ogy
D. Pull
technology
57. Which of the following refers to the process of countries being defined by the extent to
which they have only limited access to and use of technology?
A. Great digital
divide
B. Selfsourcin
g
C. Competitive
advantage
D. Prototypi
ng
True / False Questions
58. Personal software-as-a-service allows users to rent personal productivity software.
True False
59. Push technology comprises of mass e-mailings.
True False
60. A person searching for information on car rental services online is an example of push
technology.
True False
61. Push technology is unaffected by the development of data warehouse technologies.
True False
62. F2b2C is an e-commerce model where a customer can specify a custom order directly to a
factory.
True False
63. Most VoIP providers offer free unlimited long distance calling only within one's country.
True False
64. VoIP provides users with a number of value-added services such as call-waiting and caller
ID.
True False
81
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
65. Contrary to popular opinion, Web 2.0 is actually the third generation of the Web.
True False
66. Web 3.0 will use technologies such as intelligent agents and will be more personable than
Web 2.0.
True False
67. An ASR system uses haptic interfaces to capture spoken words.
True False
68. A cave automatic virtual environment is an example of a physiological innovation.
True False
69. A drawback of the ASR system is that it cannot distinguish word groupings to form
sentences.
True False
70. ASR allows one to speak in a normal voice and thus supports physiological interaction.
True False
71. A CAVE is an e-commerce business model in which a consumer communicates directly
through the Internet with a factory for customized products.
True False (F2b2C)
72. Holographic devices create and capture information in a two-dimensional form.
True False (3 dimensions)
73. A difference between a CAVE and virtual reality is that in some CAVEs, one does not need to
use special gear.
True False
74. With the help of CAVE technologies, you can visit your friends and relatives on a daily basis
no matter where they live.
True False
75. An ATM password is an example of the "what you have" aspect of personal identification.
True False
76. An iris scan is an example of the "what you know" aspect of personal identification.
True False
77. A biochip provides identification by evaluating facial characteristics.
True False
78. An implant chip stores a person's medical history.
True False
79. WiFi is usually the type of wireless communication used in a network environment.
True False
82
Downloaded by Ju Wang ([email protected])
lOMoARcPSD|9801498
80. A drawback of smartphone technology is that the development of antivirus smartphone
software is in its infancy.
True False
81. The most common implementation of RFID is the active RFID chip.
True False
82. A passive RFID chip has no power source itself and sits idle until passed near a reader that
emits radio waves.
True False
83. Library book tracking and livestock tracking are examples of applications of RFID
technologies.
True False
84. Nanotechnology and traditional manufacturing are similar to one another.
True False
85. Multi-state CPUs are binary state, capable of working with information represented by a 1 or
a 0.
True False
86. A holographic storage device is a device which stores information on a storage medium
composed of 3-D crystal like objects.
True False
87. The great digital divide enhances global stability.
True False
88. In today's technology-based world, you give up privacy when you surf the Web or register on
a Web site.
True False
83
Downloaded by Ju Wang ([email protected])