Download Toward Interactive Classrooms

Document related concepts

Clusterpoint wikipedia , lookup

Object-relational impedance mismatch wikipedia , lookup

Database model wikipedia , lookup

Transcript
Which of the following is not
included in a firm’s IT
infrastructure investments?
1.
2.
3.
4.
5.
Training and education
Consulting
Travel
Hardware
Software
The services a firm is
capable of providing to
its customers, suppliers,
and employees are a
direct function of the…
1. firm’s strategic 5-year plan.
2. amount of money spent on
hardware.
3. amount of money spent on
software.
4. firm’s IT infrastructure.
5. Not sure
Which of the following
services provides
enterprise-wide
capabilities that are
shared by all business
units?
1.
2.
3.
4.
Telecommunications
Data Management
Application software
Physical facilities
management
5. IT education
Which of the following
services focuses on
video connectivity for
employees, customers,
and suppliers?
1.
2.
3.
4.
Telecommunications
Data Management
Application software
Physical facilities
management
5. IT education
Which of the following
services offers
managers training in
how to plan for and
manage IT
investments?
1. Physical facilities management
2. Data management
3. IT management
4. IT education
5. IT research and development
Which of the following
defines the type of
client/server network in
which several different
levels of servers are
used?
1. Wintel
2. Multitiered
3. Simple
4. Application
5. Not sure
Using individual atoms
and molecules to
create computer chips
and other devices is
called…
1. atomic technology.
2. nanotechnology.
3. molecular engineering.
4. Moore’s Law.
5. transistor technology.
Which of the following is
related to the idea that the
value of a network grows
exponentially as a function
of the number of network
members?
1. Moore’s Law
2. Microprocessor Power Law
3. Law of Mass Digital Storage
4. Metcalfe’s Law
5. Not sure
Specifications that
establish the
compatibility of
products is called…
1. technology standards.
2. network economics.
3. product specifications.
4. network specifications.
5. Not sure
Ultrathin computers
stored in racks popular
in the server market are
called…
1. ultrathin computers.
2. rack computers.
3. blade servers.
4. mainframes.
5. Not sure
The most popular opensource operating system
is…
1. Windows.
2. Linux.
3. Star Office.
4. MAC OS 10.
5. PeopleSoft.
Which of the following
provides fee-paying
subscribers with space
to maintain their Web
sites?
1. Storage area network
2. Peoplesoft
3. Web hosting services
4. Microsoft
5. RedHat
The business case for
using grid computing
involves all of the
following except…
1. agility.
2. self-healing computing.
3. cost savings.
4. speed of computation.
5. Not sure
Which of the following
refers to firms off-loading
peak demand for
computing power to
remote, large-scale data
processing centers?
1. Grid computing
2. Autonomic computing
3. On-demand computing
4. Edge computing
5. Open-source computing
An operating-systemindependent, processorindependent, objectoriented programming
language used on the
Web is…
1. Linux.
2. Star Office.
3. XML.
4. HTML.
5. Java.
The foundation
technology for Web
services is…
1. Middleware.
2. XML.
3. HTML.
4. EAI software.
5. Java.
A business that delivers
and manages
applications and
computer services from
remote computer centers
is known as a(n)…
1. software outsourcer.
2. utility computing provider.
3. Internet service provider.
4. edge computing provider.
5. application service provider.
Which of the following is
not a challenge for
creating and managing a
coherent IT
infrastructure?
1. Making wise infrastructure
investments
2. Allocating costs among
business units
3. Choosing IT components
4. Dealing with change
5. Determining market demands
Which of the following
factors in the competitive
forces model dictates
that the firm make an
inventory of existing IT
infrastructure costs?
1. Market demand for your firm’s
services
2. Competitor firm’s IT
investments
3. Competitor firm’s IT services
4. Your firm’s IT strategy
5. Your firm’s business strategy
Which of the following is
not a component of the
Total Cost of Ownership
of a firm’s IT
infrastructure?
1. Travel to and from work
2. Hardware acquisition
3. Downtime
4. Space and energy
5. Training
When working with a
database, a group of related
fields comprises a(n)…
1.
2.
3.
4.
5.
file.
database.
entity.
record.
attribute.
A person, place, thing, or
event on which we store
and maintain information
using records is a(n)…
1.
2.
3.
4.
5.
file.
database.
entity.
field.
attribute.
A field in each record
that uniquely identifies
that record is called a…
1.
2.
3.
4.
5.
secondary field.
primary field.
key field.
first field.
customer field.
Which of the following
is not a problem with
the traditional file
environment?
1.
2.
3.
4.
5.
Data security
Program-data dependence
Data redundancy
Easily sharing data
Inflexibility
Which of the following
occurs when the same
data are stored in more
than one place or
location?
1. Program-data dependence
2. Data redundancy
3. Inflexible database retrieval
4. Lack of data sharing
5. Data inconsistency
Which of the following
refers to the situation in
which a change in a
software program could
require a change in the
data used by that
program?
1. Program-data dependence
2. Data redundancy
3. Inflexible database
retrieval
4. Lack of data sharing
5. Data inconsistency
The software that acts
as an interface between
application programs
and the physical data
files is…
1. middleware.
2. shareware.
3. enterprise application software.
4. database management system.
5. operating system.
Which of the following
refers to the presentation
of data as they would be
perceived by end users?
1. Conceptual schema
2. Logical view
3. Physical view
4. Physical schema
5. Subschema
The logical description of
the entire database
showing all the data
elements and
relationships among
them is called the …
1. conceptual schema.
2. logical view.
3. physical view.
4. physical schema.
5. subschema.
Which of the following
is not a component of a
database management
system?
1. Enterprise applications
2. Data definition language
3. Data manipulation language
4. Data dictionary
5. Not sure
An automated file that
stores definitions of data
elements and data
characteristics is called
a(n)…
1. data definition language.
2. data manipulation language.
3. data dictionary.
4. application program.
5. Not sure
Which type of data model
represents all data in the
database as simple twodimensional tables?
1. Hierarchical
2. Table
3. Network
4. Relational
5. Not sure
Which of the following is
not a basic operation in a
relational database?
1. Select
2. Join
3. Project
4. Print
5. Not sure
Which of the following is
not a characteristic of
data structures that have
been normalized?
1. Small
2. Stable
3. Flexible
4. Adaptive
5. Networked
A database that stores
current and historical
data of potential interest
to managers throughout
the company is called a
data …
1. mine.
2. warehouse.
3. store.
4. network.
5. crate.
Which of the following is
often used to provide
information for targeted
marketing campaigns?
1. Data mining
2. Data warehousing
3. Data storing
4. Data networking
5. Data crating
Which of the following
allows users to access
topics on a Web site in
whichever order they
wish?
1. Structured Query Languages
2. Hypermedia databases
3. Ad-hoc query languages
4. Common gateway interface
5. Database servers
A specification for
transferring information
between a Web server
and a program designed
to accept and return data
is called …
1. SQL script.
2. Data language script.
3. Java script.
4. Access script.
5. Common gateway interface.
An organizational
function with the power
to define information
requirements for the
entire company is called
a…
1. resource administration.
2. data administration.
3. database administration.
4. Data-mining administration.
5. Not sure
A database design and
management group
performs the functions of
…
1. resources administration.
2. data administration.
3. database administration.
4. data-mining administration.
5. Not sure
In many companies,
disparate networks are
moving toward a single
common foundation based
on…
1.
2.
3.
4.
5.
enterprise applications.
Internet technologies.
intranet technologies.
Windows operating systems.
Linux operating systems.
Which of the following
communication trends
has created many
alternatives for local
phone service?
1. Rapid technological innovation
2. Rapid growth in wireless
technologies
3. Rapid growth in broadband
connections
4. Telecommunications
deregulation
5. Not sure
According to Metcalfe’s
Law, the more people
participating in a
network, the …
1.
2.
3.
4.
5.
more work will be done.
less work will be done.
greater its value.
the less its value.
Not sure
Which of the following
is not a business value
impact of the
telecommunications
revolution?
1.
2.
3.
4.
5.
Improved temporal barriers
Higher quality decisions
Declining agency costs
Increased agility
Declining geographical
barriers
Each computer on a
network contains a
network interface
device called a…
1. computer network interface.
2. computer interface device.
3. broadband connection.
4. high-speed interface card.
5. network interface card.
A special communications
processor used to route
packets of data through
different networks is a…
1. hub.
2. switch.
3. router.
4. network operating system.
5. protocol.
A method of slicing
digital messages into
parcels and then
sending them through
a network using
different paths is
called…
1. parcel slicing.
2. parcel switching.
3. packet switching.
4. packet slicing.
5. packet routing.
Corporate networks are
using a single, common,
worldwide standard known
as…
1. NIC.
2. TCP/IP.
3. OSI.
4. DWDM.
5. Wi-Fi.
Which of the following is
not one of the four layers
of the TCP/IP reference
model for
communications?
1. Application layer
2. Transport layer
3. Internet layer
4. Operating system layer
5. Network layer
A set of rules and
procedures governing
transmission of
information between
two points in a network
is called…
1. switches.
2. open systems model.
3. dense wavelength division
multiplexing.
4. protocols.
5. Not sure
The physical transmission
media type that consists
of thickly insulated and
shielded copper wire is…
1. fiber-optic cable.
2. coaxial cable.
3. twisted wire.
4. optical broadband.
5. microwave cable.
Which of the following
operates over existing
copper telephone lines to
carry voice, data, and
video?
1. Cable modems
2. Digital subscriber lines
3. Microwaves
4. T-1 lines
5. Not sure
Every computer on the
Internet is assigned a
unique…
1. IP address.
2. TCP address.
3. OSI address.
4. DSL address.
5. Not sure
Which system converts IP
addresses to domain
names?
1. Network operating system
2. TCP/IP
3. Internet governance system
4. Domain name system
5. Internet service system
Which of the following is
not an Internet service to
which a client computer
has access?
1. Telnet
2. File Transfer Protocol
3. World Wide Web
4. Usenet newsgroups
5. Infodata transfer
Which of the following is
not a unique feature of
Internet technology?
1. Ubiquity
2. Richness
3. Hardware platform
4. Customization
5. Information density
The communications
standard used to transfer
pages on the Web is…
1. XML.
2. HTML.
3. HTPM.
4. HTTP.
5. FTP.
Which of the following
contains software that
looks for Web pages
containing one or more
search terms?
1. Enterprise software
2. Search engine
3. FTP
4. Web servers
5. Telnet
The most popular Web
search tool is…
1. Overture.
2. AOL.
3. Google.
4. Yahoo.
5. Altavista.
Which of the following
uses the Internet Protocol
to deliver voice
information in digital
form?
1. Telnet
2. VoIP
3. FTP
4. HTTP
5. VPN
Which of the following
is not a business value
that companies can
realize from the
increased use of
wireless networking?
1.
2.
3.
4.
5.
More flexible work arrangements
Save on wiring offices
Makes moving employees easier
Increases worker productivity
Fewer software programs
Which of the
following combine
wireless
communication with
tracking capabilities
from GPS systems?
1.
2.
3.
4.
5.
Microwave systems
Satellite positioning systems
Telematics
VHF-TV
Not sure
Which systems transmit
high-frequency radio
signals through the
atmosphere and are
widely used for highvolume, point-to-point
communications?
1.
2.
3.
4.
5.
Microwave systems
Infrared systems
Paging systems
Satellite systems
Cell phone systems
A system of protocols
and technologies that
enables cell phones and
other wireless devices
to access Web-based
information and
services is called…
1.
2.
3.
4.
5.
wireless markup language.
wireless application protocols.
microbrowser.
I-mode.
Not sure
To access Web-based
information, a person
with a WAP-compliant
phone would use a(n)…
1.
2.
3.
4.
5.
wireless markup language.
wireless application protocol.
microbrowser.
I-mode.
Not sure
The 802.15 wireless
networking standard useful
for creating small personal
area networks is known
as…
1. Wi-fi.
2. Wi-max.
3. Wi-mod.
4. Bluetooth.
5. Wireless NIC.
A box consisting of a
radio receiver/transmitter
and antennas that link to
a wired network, router,
or hub is called a(n)…
1. access point.
2. wireless NIC.
3. LAN bridge.
4. antenna point.
5. Wi-Max.
One or more access points
positioned in strategic
public places to provide
maximum wireless
coverage are called…
1. EV-DO connections.
2. DSL access points.
3. cell access points.
4. hotspots.
5. Not sure
A major drawback of
increased Wi-Fi usage
is…
1. too few users.
2. too many users.
3. weak security.
4. difficulty in establishing a
connection.
5. Not sure
Which of the following
offers wireless access
ranges of up to 31
miles?
1. Wi-Fi
2. Wi-Max
3. Bluetooth
4. EV-DO
5. GSM cellular service
A type of wireless
computing, in which users
move from wireless
hotspot to wireless
hotspot, is sometimes
referred to as…
1. wardriving.
2. nomadic computing.
3. hotspot computing.
4. hotspot jumping.
5. access computing.
Special Web sites that
feature optimized content
and services for mobile
devices are known as…
1. wireless portals.
2. sub-Web portals.
3. nomadic portals.
4. mobile portals.
5. Not sure
Digital wallets used for
wireless mobile
commerce transactions
are referred to as…
1. d-wallets.
2. m-wallets.
3. c-wallets.
4. w-wallets.
5. p-wallets.
A powerful technology for
tracking the movement of
goods throughout a
supply chain using tags
with embedded
microchips is …
1. cell phone transponders.
2. pervasive computing.
3. wireless sensor networks.
4. RFID.
5. bar codes.
RFID tags consist of a
microchip that stores
data and a(n)…
1. processor.
2. antenna.
3. hard drive.
4. DVD recorder.
5. motherboard.
Which of the following
describes the type of
RFID tag that typically
enables data to be
rewritten or modified?
1. Read/Write
2. Active
3. Passive
4. RR/RW
5. Not sure
The idea that computers
will become increasingly
embedded in our natural
movements and
throughout our
environment is referred
to as…
1. environmental computing.
2. wireless computing.
3. nomadic computing.
4. pervasive computing.
5. Not sure
Which of the following is
widely used in wireless
sensor networks that
control environmental
factors such as heating,
air conditioning, and
lighting in buildings?
1. ZigBee protocols
2. IP protocols
3. TCP protocols
4. Environmental protocols
5. Not sure
Which of the following
is not necessarily a
management
challenge posed by
wireless technology?
1. Managing the technology
2. Integrating the technology into
the IT infrastructure
3. Determining the appropriate
number of users
4. Maintaining security
5. Maintaining privacy
Which of the following is
not a guideline for
managing mobile
technology in the
enterprise?
1.
Determine the validity of wireless
computing
2.
Identify areas in which it can provide
value
3.
Create a framework for the
technology
4.
Use pilot programs to test wireless
systems
5.
Not sure
Which of the following
is not a source of
common threats against
contemporary
information systems?
1.
2.
3.
4.
5.
Too many users
Technical factors
Organizational factors
Environmental factors
Poor management decisions
The act of
eavesdroppers
driving by buildings
or parking outside
and intercepting
wireless network
traffic is called…
1.
2.
3.
4.
5.
eavesdropping.
war driving.
driving interception.
wireless interception.
Not sure
Computer viruses,
worms, and Trojan
horses are collectively
called…
1.
2.
3.
4.
5.
spyware.
spam.
groupware.
malware.
macroware.
A rogue software
program that attaches
itself to other software
programs or data files
in order to be executed
is called a…
1.
2.
3.
4.
5.
Trojan horse.
worm.
virus.
spoofer.
spammer.
A software program
that appears to be
benign, but then does
something other than
expected is called a…
1.
2.
3.
4.
5.
Trojan horse.
worm.
virus.
spoofer.
spammer.
An independent computer
program that copies itself
from one computer to
others over a network and
operates on its own is
referred to as a …
1.
2.
3.
4.
5.
Trojan horse
worm.
virus.
spoofer.
spammer.
A type of eavesdropping
program that monitors
information traveling
over a network is known
as…
1. a spoofer.
2. a sniffer.
3. spyware.
4. spam.
5. spybot.
A crime in which an
imposter obtains key
pieces of personal
information in order to
impersonate another
person is known as…
1. spoofing.
2. identity theft.
3. denial of service attack.
4. fraud.
5. breach of confidentiality.
The act of setting up fake
Web sites or sending
emails that look like those
of legitimate businesses
asking users for
confidential personal data
is called…
1. phishing.
2. faking.
3. spotting.
4. denial of service.
5. theft.
The largest financial
threats to business
institutions come
from…
1. the competition.
2. customers.
3. suppliers.
4. the government.
5. insiders.
A major source of errors
introduced into an
information system comes
from…
1. suppliers.
2. customers.
3. business partners.
4. employees.
5. networks.
A major problem with
software is…
1. customer input.
2. supplier access.
3. presence of hidden bugs.
4. network access points.
5. business partner input.
Which of the following
pieces of government
legislation was designed
to protect investors from
financial scandals?
1. HIPAA
2. Gramm-Leach-Bliley Act
3. Sarbanes-Oxley Act of 2002
4. ISO 17799
5. Child Decency Act
The type of control
associated with the
accuracy and
completeness of data
when they enter the
system is referred to as…
1. general controls.
2. input controls.
3. processing controls.
4. output controls.
5. network controls.
Which of the following is
not an element of a risk
assessment?
1. Value of information assets
2. Points of vulnerability
3. Likely frequency of a problem
4. Potential for damage
5. Cost of erroneous data
Which of the following is
not an integral part of a
well-formulated security
policy?
1. Ranking information risks
2. Identifying acceptable security
goals
3. Level of acceptable risk
4. Number of network access
points
5. Identifying security goals
Which of the following is
not a method of ensuring
business continuity
associated with
information systems?
1. Fault-tolerant systems
2. High-availability systems
3. Limiting the number of users
4. Load balancing
5. Mirroring
Which of the following
consists of all the policies
and procedures a
company uses to prevent
improper system access
by unauthorized
outsiders?
1. Access control
2. Authentication
3. Biometric authentication
4. Firewalls
5. Spyware
Which of the following
access controls is
based on the
measurement of a
physical or behavioral
trait that makes each
individual unique?
1. Intrusion Detection systems
2. Authentication
3. Biometric authentication
4. Firewalls
5. Spyware
A method for
encrypting data
flowing over the
Internet, but limited to
Web documents is…
1. secure sockets layer.
2. public key infrastructure.
3. secure hypertext transfer protocol.
4. transport layer security.
5. digital certificates.