Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Which of the following is not included in a firm’s IT infrastructure investments? 1. 2. 3. 4. 5. Training and education Consulting Travel Hardware Software The services a firm is capable of providing to its customers, suppliers, and employees are a direct function of the… 1. firm’s strategic 5-year plan. 2. amount of money spent on hardware. 3. amount of money spent on software. 4. firm’s IT infrastructure. 5. Not sure Which of the following services provides enterprise-wide capabilities that are shared by all business units? 1. 2. 3. 4. Telecommunications Data Management Application software Physical facilities management 5. IT education Which of the following services focuses on video connectivity for employees, customers, and suppliers? 1. 2. 3. 4. Telecommunications Data Management Application software Physical facilities management 5. IT education Which of the following services offers managers training in how to plan for and manage IT investments? 1. Physical facilities management 2. Data management 3. IT management 4. IT education 5. IT research and development Which of the following defines the type of client/server network in which several different levels of servers are used? 1. Wintel 2. Multitiered 3. Simple 4. Application 5. Not sure Using individual atoms and molecules to create computer chips and other devices is called… 1. atomic technology. 2. nanotechnology. 3. molecular engineering. 4. Moore’s Law. 5. transistor technology. Which of the following is related to the idea that the value of a network grows exponentially as a function of the number of network members? 1. Moore’s Law 2. Microprocessor Power Law 3. Law of Mass Digital Storage 4. Metcalfe’s Law 5. Not sure Specifications that establish the compatibility of products is called… 1. technology standards. 2. network economics. 3. product specifications. 4. network specifications. 5. Not sure Ultrathin computers stored in racks popular in the server market are called… 1. ultrathin computers. 2. rack computers. 3. blade servers. 4. mainframes. 5. Not sure The most popular opensource operating system is… 1. Windows. 2. Linux. 3. Star Office. 4. MAC OS 10. 5. PeopleSoft. Which of the following provides fee-paying subscribers with space to maintain their Web sites? 1. Storage area network 2. Peoplesoft 3. Web hosting services 4. Microsoft 5. RedHat The business case for using grid computing involves all of the following except… 1. agility. 2. self-healing computing. 3. cost savings. 4. speed of computation. 5. Not sure Which of the following refers to firms off-loading peak demand for computing power to remote, large-scale data processing centers? 1. Grid computing 2. Autonomic computing 3. On-demand computing 4. Edge computing 5. Open-source computing An operating-systemindependent, processorindependent, objectoriented programming language used on the Web is… 1. Linux. 2. Star Office. 3. XML. 4. HTML. 5. Java. The foundation technology for Web services is… 1. Middleware. 2. XML. 3. HTML. 4. EAI software. 5. Java. A business that delivers and manages applications and computer services from remote computer centers is known as a(n)… 1. software outsourcer. 2. utility computing provider. 3. Internet service provider. 4. edge computing provider. 5. application service provider. Which of the following is not a challenge for creating and managing a coherent IT infrastructure? 1. Making wise infrastructure investments 2. Allocating costs among business units 3. Choosing IT components 4. Dealing with change 5. Determining market demands Which of the following factors in the competitive forces model dictates that the firm make an inventory of existing IT infrastructure costs? 1. Market demand for your firm’s services 2. Competitor firm’s IT investments 3. Competitor firm’s IT services 4. Your firm’s IT strategy 5. Your firm’s business strategy Which of the following is not a component of the Total Cost of Ownership of a firm’s IT infrastructure? 1. Travel to and from work 2. Hardware acquisition 3. Downtime 4. Space and energy 5. Training When working with a database, a group of related fields comprises a(n)… 1. 2. 3. 4. 5. file. database. entity. record. attribute. A person, place, thing, or event on which we store and maintain information using records is a(n)… 1. 2. 3. 4. 5. file. database. entity. field. attribute. A field in each record that uniquely identifies that record is called a… 1. 2. 3. 4. 5. secondary field. primary field. key field. first field. customer field. Which of the following is not a problem with the traditional file environment? 1. 2. 3. 4. 5. Data security Program-data dependence Data redundancy Easily sharing data Inflexibility Which of the following occurs when the same data are stored in more than one place or location? 1. Program-data dependence 2. Data redundancy 3. Inflexible database retrieval 4. Lack of data sharing 5. Data inconsistency Which of the following refers to the situation in which a change in a software program could require a change in the data used by that program? 1. Program-data dependence 2. Data redundancy 3. Inflexible database retrieval 4. Lack of data sharing 5. Data inconsistency The software that acts as an interface between application programs and the physical data files is… 1. middleware. 2. shareware. 3. enterprise application software. 4. database management system. 5. operating system. Which of the following refers to the presentation of data as they would be perceived by end users? 1. Conceptual schema 2. Logical view 3. Physical view 4. Physical schema 5. Subschema The logical description of the entire database showing all the data elements and relationships among them is called the … 1. conceptual schema. 2. logical view. 3. physical view. 4. physical schema. 5. subschema. Which of the following is not a component of a database management system? 1. Enterprise applications 2. Data definition language 3. Data manipulation language 4. Data dictionary 5. Not sure An automated file that stores definitions of data elements and data characteristics is called a(n)… 1. data definition language. 2. data manipulation language. 3. data dictionary. 4. application program. 5. Not sure Which type of data model represents all data in the database as simple twodimensional tables? 1. Hierarchical 2. Table 3. Network 4. Relational 5. Not sure Which of the following is not a basic operation in a relational database? 1. Select 2. Join 3. Project 4. Print 5. Not sure Which of the following is not a characteristic of data structures that have been normalized? 1. Small 2. Stable 3. Flexible 4. Adaptive 5. Networked A database that stores current and historical data of potential interest to managers throughout the company is called a data … 1. mine. 2. warehouse. 3. store. 4. network. 5. crate. Which of the following is often used to provide information for targeted marketing campaigns? 1. Data mining 2. Data warehousing 3. Data storing 4. Data networking 5. Data crating Which of the following allows users to access topics on a Web site in whichever order they wish? 1. Structured Query Languages 2. Hypermedia databases 3. Ad-hoc query languages 4. Common gateway interface 5. Database servers A specification for transferring information between a Web server and a program designed to accept and return data is called … 1. SQL script. 2. Data language script. 3. Java script. 4. Access script. 5. Common gateway interface. An organizational function with the power to define information requirements for the entire company is called a… 1. resource administration. 2. data administration. 3. database administration. 4. Data-mining administration. 5. Not sure A database design and management group performs the functions of … 1. resources administration. 2. data administration. 3. database administration. 4. data-mining administration. 5. Not sure In many companies, disparate networks are moving toward a single common foundation based on… 1. 2. 3. 4. 5. enterprise applications. Internet technologies. intranet technologies. Windows operating systems. Linux operating systems. Which of the following communication trends has created many alternatives for local phone service? 1. Rapid technological innovation 2. Rapid growth in wireless technologies 3. Rapid growth in broadband connections 4. Telecommunications deregulation 5. Not sure According to Metcalfe’s Law, the more people participating in a network, the … 1. 2. 3. 4. 5. more work will be done. less work will be done. greater its value. the less its value. Not sure Which of the following is not a business value impact of the telecommunications revolution? 1. 2. 3. 4. 5. Improved temporal barriers Higher quality decisions Declining agency costs Increased agility Declining geographical barriers Each computer on a network contains a network interface device called a… 1. computer network interface. 2. computer interface device. 3. broadband connection. 4. high-speed interface card. 5. network interface card. A special communications processor used to route packets of data through different networks is a… 1. hub. 2. switch. 3. router. 4. network operating system. 5. protocol. A method of slicing digital messages into parcels and then sending them through a network using different paths is called… 1. parcel slicing. 2. parcel switching. 3. packet switching. 4. packet slicing. 5. packet routing. Corporate networks are using a single, common, worldwide standard known as… 1. NIC. 2. TCP/IP. 3. OSI. 4. DWDM. 5. Wi-Fi. Which of the following is not one of the four layers of the TCP/IP reference model for communications? 1. Application layer 2. Transport layer 3. Internet layer 4. Operating system layer 5. Network layer A set of rules and procedures governing transmission of information between two points in a network is called… 1. switches. 2. open systems model. 3. dense wavelength division multiplexing. 4. protocols. 5. Not sure The physical transmission media type that consists of thickly insulated and shielded copper wire is… 1. fiber-optic cable. 2. coaxial cable. 3. twisted wire. 4. optical broadband. 5. microwave cable. Which of the following operates over existing copper telephone lines to carry voice, data, and video? 1. Cable modems 2. Digital subscriber lines 3. Microwaves 4. T-1 lines 5. Not sure Every computer on the Internet is assigned a unique… 1. IP address. 2. TCP address. 3. OSI address. 4. DSL address. 5. Not sure Which system converts IP addresses to domain names? 1. Network operating system 2. TCP/IP 3. Internet governance system 4. Domain name system 5. Internet service system Which of the following is not an Internet service to which a client computer has access? 1. Telnet 2. File Transfer Protocol 3. World Wide Web 4. Usenet newsgroups 5. Infodata transfer Which of the following is not a unique feature of Internet technology? 1. Ubiquity 2. Richness 3. Hardware platform 4. Customization 5. Information density The communications standard used to transfer pages on the Web is… 1. XML. 2. HTML. 3. HTPM. 4. HTTP. 5. FTP. Which of the following contains software that looks for Web pages containing one or more search terms? 1. Enterprise software 2. Search engine 3. FTP 4. Web servers 5. Telnet The most popular Web search tool is… 1. Overture. 2. AOL. 3. Google. 4. Yahoo. 5. Altavista. Which of the following uses the Internet Protocol to deliver voice information in digital form? 1. Telnet 2. VoIP 3. FTP 4. HTTP 5. VPN Which of the following is not a business value that companies can realize from the increased use of wireless networking? 1. 2. 3. 4. 5. More flexible work arrangements Save on wiring offices Makes moving employees easier Increases worker productivity Fewer software programs Which of the following combine wireless communication with tracking capabilities from GPS systems? 1. 2. 3. 4. 5. Microwave systems Satellite positioning systems Telematics VHF-TV Not sure Which systems transmit high-frequency radio signals through the atmosphere and are widely used for highvolume, point-to-point communications? 1. 2. 3. 4. 5. Microwave systems Infrared systems Paging systems Satellite systems Cell phone systems A system of protocols and technologies that enables cell phones and other wireless devices to access Web-based information and services is called… 1. 2. 3. 4. 5. wireless markup language. wireless application protocols. microbrowser. I-mode. Not sure To access Web-based information, a person with a WAP-compliant phone would use a(n)… 1. 2. 3. 4. 5. wireless markup language. wireless application protocol. microbrowser. I-mode. Not sure The 802.15 wireless networking standard useful for creating small personal area networks is known as… 1. Wi-fi. 2. Wi-max. 3. Wi-mod. 4. Bluetooth. 5. Wireless NIC. A box consisting of a radio receiver/transmitter and antennas that link to a wired network, router, or hub is called a(n)… 1. access point. 2. wireless NIC. 3. LAN bridge. 4. antenna point. 5. Wi-Max. One or more access points positioned in strategic public places to provide maximum wireless coverage are called… 1. EV-DO connections. 2. DSL access points. 3. cell access points. 4. hotspots. 5. Not sure A major drawback of increased Wi-Fi usage is… 1. too few users. 2. too many users. 3. weak security. 4. difficulty in establishing a connection. 5. Not sure Which of the following offers wireless access ranges of up to 31 miles? 1. Wi-Fi 2. Wi-Max 3. Bluetooth 4. EV-DO 5. GSM cellular service A type of wireless computing, in which users move from wireless hotspot to wireless hotspot, is sometimes referred to as… 1. wardriving. 2. nomadic computing. 3. hotspot computing. 4. hotspot jumping. 5. access computing. Special Web sites that feature optimized content and services for mobile devices are known as… 1. wireless portals. 2. sub-Web portals. 3. nomadic portals. 4. mobile portals. 5. Not sure Digital wallets used for wireless mobile commerce transactions are referred to as… 1. d-wallets. 2. m-wallets. 3. c-wallets. 4. w-wallets. 5. p-wallets. A powerful technology for tracking the movement of goods throughout a supply chain using tags with embedded microchips is … 1. cell phone transponders. 2. pervasive computing. 3. wireless sensor networks. 4. RFID. 5. bar codes. RFID tags consist of a microchip that stores data and a(n)… 1. processor. 2. antenna. 3. hard drive. 4. DVD recorder. 5. motherboard. Which of the following describes the type of RFID tag that typically enables data to be rewritten or modified? 1. Read/Write 2. Active 3. Passive 4. RR/RW 5. Not sure The idea that computers will become increasingly embedded in our natural movements and throughout our environment is referred to as… 1. environmental computing. 2. wireless computing. 3. nomadic computing. 4. pervasive computing. 5. Not sure Which of the following is widely used in wireless sensor networks that control environmental factors such as heating, air conditioning, and lighting in buildings? 1. ZigBee protocols 2. IP protocols 3. TCP protocols 4. Environmental protocols 5. Not sure Which of the following is not necessarily a management challenge posed by wireless technology? 1. Managing the technology 2. Integrating the technology into the IT infrastructure 3. Determining the appropriate number of users 4. Maintaining security 5. Maintaining privacy Which of the following is not a guideline for managing mobile technology in the enterprise? 1. Determine the validity of wireless computing 2. Identify areas in which it can provide value 3. Create a framework for the technology 4. Use pilot programs to test wireless systems 5. Not sure Which of the following is not a source of common threats against contemporary information systems? 1. 2. 3. 4. 5. Too many users Technical factors Organizational factors Environmental factors Poor management decisions The act of eavesdroppers driving by buildings or parking outside and intercepting wireless network traffic is called… 1. 2. 3. 4. 5. eavesdropping. war driving. driving interception. wireless interception. Not sure Computer viruses, worms, and Trojan horses are collectively called… 1. 2. 3. 4. 5. spyware. spam. groupware. malware. macroware. A rogue software program that attaches itself to other software programs or data files in order to be executed is called a… 1. 2. 3. 4. 5. Trojan horse. worm. virus. spoofer. spammer. A software program that appears to be benign, but then does something other than expected is called a… 1. 2. 3. 4. 5. Trojan horse. worm. virus. spoofer. spammer. An independent computer program that copies itself from one computer to others over a network and operates on its own is referred to as a … 1. 2. 3. 4. 5. Trojan horse worm. virus. spoofer. spammer. A type of eavesdropping program that monitors information traveling over a network is known as… 1. a spoofer. 2. a sniffer. 3. spyware. 4. spam. 5. spybot. A crime in which an imposter obtains key pieces of personal information in order to impersonate another person is known as… 1. spoofing. 2. identity theft. 3. denial of service attack. 4. fraud. 5. breach of confidentiality. The act of setting up fake Web sites or sending emails that look like those of legitimate businesses asking users for confidential personal data is called… 1. phishing. 2. faking. 3. spotting. 4. denial of service. 5. theft. The largest financial threats to business institutions come from… 1. the competition. 2. customers. 3. suppliers. 4. the government. 5. insiders. A major source of errors introduced into an information system comes from… 1. suppliers. 2. customers. 3. business partners. 4. employees. 5. networks. A major problem with software is… 1. customer input. 2. supplier access. 3. presence of hidden bugs. 4. network access points. 5. business partner input. Which of the following pieces of government legislation was designed to protect investors from financial scandals? 1. HIPAA 2. Gramm-Leach-Bliley Act 3. Sarbanes-Oxley Act of 2002 4. ISO 17799 5. Child Decency Act The type of control associated with the accuracy and completeness of data when they enter the system is referred to as… 1. general controls. 2. input controls. 3. processing controls. 4. output controls. 5. network controls. Which of the following is not an element of a risk assessment? 1. Value of information assets 2. Points of vulnerability 3. Likely frequency of a problem 4. Potential for damage 5. Cost of erroneous data Which of the following is not an integral part of a well-formulated security policy? 1. Ranking information risks 2. Identifying acceptable security goals 3. Level of acceptable risk 4. Number of network access points 5. Identifying security goals Which of the following is not a method of ensuring business continuity associated with information systems? 1. Fault-tolerant systems 2. High-availability systems 3. Limiting the number of users 4. Load balancing 5. Mirroring Which of the following consists of all the policies and procedures a company uses to prevent improper system access by unauthorized outsiders? 1. Access control 2. Authentication 3. Biometric authentication 4. Firewalls 5. Spyware Which of the following access controls is based on the measurement of a physical or behavioral trait that makes each individual unique? 1. Intrusion Detection systems 2. Authentication 3. Biometric authentication 4. Firewalls 5. Spyware A method for encrypting data flowing over the Internet, but limited to Web documents is… 1. secure sockets layer. 2. public key infrastructure. 3. secure hypertext transfer protocol. 4. transport layer security. 5. digital certificates.