INFO101

¡Supera tus tareas y exámenes ahora con Quizwiz!

Using IT for social responsibility reasons and using information technology to mitigate harmful effects is called: a) Helpful IT b) Blue IT c) Green IT d) Philanthropic IT e) Triple bottom line IT

e) Triple bottom line IT

An IT system that replaces an entire business category or function is said to be a ________________? a) Disruptive system b) Destructive system c) Complex system d) Adaptive system e) Invasive system

A) Disruptive system

The executive function typically in charge of information systems definition, selection, procurement and operation is the ________? a) CTO b) COO c) CFO d) CIO e) CPO

CIO

An example of an Expert System is a: a) Credit risk evaluator b) Library catalogue c) Payroll system d) Point of Sale system e) Wiki-based encyclopaedia

a) Credit risk evaluator

The process of giving customers the ability to customise products and services that would traditionally have been mass produced is: a) Mass customisation b) Mass transit c) Supply chain configuration d) eCommerce e) Intermediation

a) Mass customisation

An information system that supports functions of say, Customs control, wholesale distribution and retail in different businesses is a ______________? a) Supply chain management system (SCM) b) Inter-organisational system (IOS) c) Enterprise resources program (ERP) d) Material flow management application (MFMA) e) eCommerce system

a) Supply chain management system (SCM)

Which of the following statements is true? a) UDP is ideal for sending video streams b) All banking transactions should be sent using UDP c) UDP is very fast and very secure d) TCP is too unreliable to use for critical data streams e) TCP will always be a better choice than UDP

a) UDP is ideal for sending video streams

The UFBI stands for: a) Ultra-fast Broadband Initiative b) Under-five Basic Illiteracy United c) Fibre Base Index d) United Finance Base Index Upper e) Fake Bandwidth Identifier

a) Ultra-fast Broadband Initiative

Which of the following are needed in order for you to pay someone in a cryptocurrency such as Ethereum? a) Your private key and their public key (address) b) Your public key (address) and their private key c) Both private keys d) Both public keys (addresses) e) No private or public keys

a) Your private key and their public key (address)

What is a "smart contract"? a) An arrangement between two people that, when seen from one person's point of view, is an unfairly good deal. b) A computer protocol intended to digitally facilitate, verify, or enforce the negotiation or performance of a contract. c) A digital apparatus that can expand or contract a synthetic muscle based on input from a digital sensor such as a temperature gauge. d) A financial instrument that was designed by an artificial intelligence, with wording that may or may not be understandable by humans. e) Any contract that existed in digital form before it was signed.

b) A computer protocol intended to digitally facilitate, verify, or enforce the negotiation or performance of a contract.

Which of the following is a definition of synergy as discussed in class: a) A brand of petrol that contains ethanol b) Creating a whole that is greater than the sum of its parts c) Creating a hole that is deeper than its width d) Not creating a hole at all e) Teaching a device to dig a hole

b) Creating a whole that is greater than the sum of its parts

SQL is a: a) Current accounting procedure b) Database query language c) Hardware peripheral d) Network architecture model e) Square logical program

b) Database query language

________________ is part of the three components of intellectual capital. a) Search capital b) Human capital c) Mobile capital d) Runway capital e) Transport capital

b) Human capital

HTTP stands for: a) Highly Technical Transmission Protocol b) Hypertext Transfer Protocol c) Hewlett Packard Text Processor d) HTML Text Translation Protocol e) Hypertext Transmission Tuple Processor

b) Hypertext transfer protocol

Which international body coordinates the assignment of IP addresses? a) FIFA b) ICANN c) ICSI d) IETF e) ISO

b) ICANN

The type of knowledge that is an accumulation of subjective, experiential learning is: a) Wisdom b) Implicit knowledge c) Proportional knowledge d) Explicit knowledge e) Differential knowledge

b) Implicit knowledge

A person who is knowledgeable and confident about the use and capability of information systems and information technology is best described as a/an: a) Super user b) Informed user c) Systems administrator d) Applications programmer e) Holographic user

b) Informed user

Which one of the following best describes tactic knowledge: a) Codified b) Insightful c) Objective d) Rational e) Technical

b) Insightful

Using artificial intelligence principles and statistical techniques to model and predict behaviour with evolving rules that change and adapt over time is: a) Automatic learning b) Machine learning c) Data learning d) Book learning e) Device learning

b) Machine learning

A communications network that uses radios in a geographic pattern with a repeating pattern of frequencies that do not overlap is called: a) A local area network b) Near field radio communications c) A cellular radio network d) Wi-Fi e) Bluetooth

b) Near field radio communications

When a vendor hosts software applications and provides them on demand to a customer over a network, it is called: a) Denial of service b) Software-as-a-service c) Hot site software d) Open source software e) Operating systems software

b) Software-as-a-service

The process of converting business procedures from human oriented activities to technology intensive activities with minimal human intervention is called: a) Globalisation b) Intensification c) Automation d) Disintermediation e) Communism

c) Automation

The executive function typically in charge of information systems definition, selection, procurement and operation is the: a) Chief operating officer b) Information manager c) Chief information officer d) Database administrator e) EDP manager

c) Chief information officer

Nonako's knowledge management model (SECI) has four parts. Which of the following is NOT part of Nonako's model: a) Combination b) Internalization c) Competition d) Externalization e) Socialization

c) Competition

Which item in this list is not a typical biometric security control? a) Facial recognition b) Fingerprint scan c) MRI scan d) Palm scan e) Retina scan

c) MRI scan

An IT artefact that is described as: communications devices and software for linking devices is a ______________ artefact. a) Hardware b) Procedural c) Network d) Software e) Database

c) Network

In business intelligence a three-dimensional model of related data such as Sales Channel, Product and Time that is used to record a sales action is called an: a) Data cube b) Online cube c) OLAP cube d) Borg cube e) Rubic cube

c) OLAP cube

The five layers of the Internet TCP/IP model are (in order): a) Physical, Network, Communication, Presentation, Application b) Network, Data, Communication, User, Application c) Physical, Datalink, Network, Transport, Application d) Datalink, Physical, Communication, Transport, Application e) Network, Communication, Session, User, Application

c) Physical, Datalink, Network, Transport, Application

In class, we discussed human population size and energy usage per person (per capita). Which of the following is true, in the past 100 years? a) Population has gone up and per capita energy usage has gone down, leading to slow growth in total energy usage. b) Population has gone down and per capita energy usage has gone up, leading to slow growth in total energy usage. c) Population has gone up and per capita energy usage has gone up, leading to fast growth in total energy usage. d) Population has gone up and per capita energy usage has gone down, leading to a slow decline in total energy usage. e) Population has gone down and per capita energy usage has gone down, leading to a fast decline in total energy usage.

c) Population has gone up and per capita energy usage has gone up, leading to fast growth in total energy usage.

The New Zealand act of Parliament that looks after the rights of individuals to know what information is being held about them and have the ability to correct that information is called: a) The Crimes Act b) The Privacy and Ethics Commission c) The Privacy Act d) The Harmful Data Communication Act e) The Privacy Regulations

c) The Privacy Act

An information resource vulnerability is defined as _____________? a) The likelihood it is redundant b) The likelihood it will be sold at a low price c) The possibility the system will suffer harm by a threat d) The system being a high energy user e) The system not providing accurate information

c) The possibility the system will suffer harm by a threat

In the Porter's Five Forces model, a threat that new competitors entering your market will challenge your business when entry barriers are low is the: a) Threat of market participants b) Threat of incoming capital c) Threat of new entrants d) Threat of new rivals e) Threat of substitution

c) Threat of new entrants

A system that enables customers, businesses, or agencies to transact online is generically called a _____________ system. a) Enterprise resource program (ERP) b) Online transaction processing (OLTP) c) eCommerce d) Website e) Clerical system

c) eCommerce

IPVersion6 addresses consist of how many bits: a) 16 b) 32 c) 64 d) 128 e) 256

d) 128

Which of the following best describes an Internet protocol? a) A protocol sets out how to correct errors that occur across the Internet b) A protocol works out where on the Internet to send a message c) A protocol is the order in which messages should arrive d) A protocol is the set of rules that govern information exchange within and between processes e) A protocol defines the speed of communications in the Internet

d) A protocol is the set of rules that govern information exchange within and between processes

A point of sale is an example of: a) An ERP b) An online shopping cart c) An expert system d) A transactional system e) An automated kiosk

d) A transactional system

In the 2012 report titled "Computing Research for Sustainability" by the US National Academies, discussed in class, sustainability is, at its root, what kind of problem: a) A technical problem b) A relatively simple problem c) A combinatorial problem d) An economic, political, and cultural problem e) A problem that only researchers could ever truly understand.

d) An economic, political, and cultural problem

A computer program that supports a specific task or organisational function is a program supporting a/an: a) Online database b) Operating system c) Systems architecture d) Application e) Business process

d) Application

When an organisation has carefully planned its IT functions to support and enable its business objectives, it is said to have: a) Tactical alignment b) CIO alignment c) Computing cooperation d) Business alignment e) Organisational alignment

d) Business alignment

B2B stands for: a) Bank to bank b) Bank to business c) Business to bank d) Business to business e) None of the above

d) Business to business

The process of using a medium such as electricity or radio to store or transmit a message is called: a) Modifying b) Simplifying c) Terrifying d) Codifying e) Notifying

d) Codifying

Processing and organising data to make it more useful is giving it: a) A new life b) Wings c) Extensibility d) Context e) Drama

d) Context

Amazons Mechanical Turk system is an example of: a) Machine Learning b) Blockchain technology c) Mainframe computing d) Crowdsourcing e) Hacktivism

d) Crowdsourcing

In the _______________ layer of the Internet model you would find the processing of an Ethernet frame. a) Application b) Presentation c) Network d) Datalink e) Physical

d) Datalink

The hierarchical database that matches names with Internet addresses in the Internet is the: a) Host configuration protocol b) Internet protocol c) Active directory d) Domain name system e) Association of names and numbers.

d) Domain name system

The type of knowledge that deals with objective, rational and easily codified knowledge is: a) Wisdom b) Implicit knowledge c) Proportional knowledge d) Explicit knowledge e) Differential knowledge

d) Explicit knowledge

In class we discussed a blockchain platform called Bitcoin and its founder Satoshi Nakamoto. Who is Satoshi Nakamoto? a) A reclusive scientist living at the base of Mount Fuji b) A fictional character created by the US Central Intelligence Agency c) A collection of economists working together under a pseudonym d) It's not currently known who Satoshi Nakamoto is e) A young woman in Canada, who was 15 years old when she invented Bitcoin

d) It's not currently known who Satoshi Nakamoto is

A phishing attack tries to gather sensitive information by: a) Adding a segment of computer code that will replicate itself around a system b) Attaching a virus to applications software c) Bombarding an account with email messages d) Masquerading as official-looking email messages e) Using a password to enter a computer system by the backdoor

d) Masquerading as official-looking email messages

A firewall is used to: a) Audit the risk of information resources being stolen b) Check the strength of passwords and delete those that are weak c) Scan for viruses and delete them d) Prevent unauthorised internet users accessing private networks e) Prevent unauthorised personnel entering a secure computer room

d) Prevent unauthorised internet users accessing private networks

A pair of tables that share a common value so they can be linked logically is a ___________________ database? a) Differential b) Proportional c) Associative d) Relational e) Fractional

d) Relational

Who has the strongest claim to being the inventor of the World Wide Web? a) Bill Gates b) Ada Lovelace c) Steve Jobs d) Tim Berners-Lee e) Linus Torvalds

d) Tim Berners-Lee

The ethical standard in which actions are considered ethical if they provide the most good for the least harm is called the: a) Human rights approach b) Fairness approach c) Common good approach d) Utilitarian approach e) Accountability approach

d) Utilitarian approach

What is the Slashdot effect: a) When a hacker tries to cause people to visit a spoofing site by adding a trailing slash and dot to the URL b) When network lag causes a crowdsourcing site to become as slow as Morse code c) When a typo in a programmer's code causes a security vulnerability d) When a popular website links to a less popular website, and the large amount of web traffic causes the smaller website to slow down or become unavailable e) When a mistyped emoji leads to a misunderstanding via instant messaging

d) When a popular website links to a less popular website, and the large amount of web traffic causes the smaller website to slow down or become unavailable

Which of the following is NOT a characteristic of information in the data, information and knowledge continuum: a) Label b) Classify c) Transform d) Link e) Contextualize

e) Contextualise

The global distributed database on the Internet that enables IP locations on the Internet to be discovered using their more easily remembered name (i.e. the URL) is called the: a) White pages b) Distributed Name System (DNS) c) Digital Management Service (DMS) d) Domain Name System (DNS) e) Distributed Name Service (DNS)

e) Domain Name Service (DNS)

What are the three legs of the sustainability model discussed in class? a) Environmental, Political, Economic b) Social, Developmental, Economic c) Profitability, Exploitation, Consumption d) Lime, Water, Sand e) Environmental, Social, Economic

e) Environmental, Social, Economic

A data point in the data, information and knowledge hierarchy, such as the integer 140, is best described as a/an: a) Simple number b) Digital artefact c) Pre-knowledge d) Alternative fact e) Raw fact

e) Raw fact

An operational CRM system: a) Actuates cathode ray maintenance b) Brings international standards to marketing practices c) Informs company staff when stocks of products are falling low d) Sets the prices of products sold online e) Supports front-office business processes

e) Supports front-office business processes

The gap between individuals and groups who can enjoy the benefits of information and communications technology and those who would if they could afford it is called ____________? a) The generation gap b) The digital chasm c) The information gap d) Culture shock e) The digital divide

e) The digital divide

'Shoulder surfing' is a security threat in which ________________________? a) The perpetrator completes exam questions by looking at another student's answers b) The perpetrator falsifies their identity to gain entry into a secure area c) The perpetrator follows staff into a building through a security door d) The perpetrator snatches a company laptop from a person's shoulder e) The perpetrator watches an employee's computer screen over the person's shoulder

e) The perpetrator watches an employee's computer screen over the person's shoulder

Which of the following security breaches is not the result of human error? a) Leaving a company laptop on a bus b) Letting unauthorised people into the company office c) Opening an email message without being sure of its origin d) Over-writing a new file with an older version e) Theft of company hardware by a criminal gang

e) Theft of company hardware by a criminal gang


Conjuntos de estudio relacionados

الرياضيات ثاني متوسط الفصل الثاني

View Set

Domain 3.2: Compare and contrast business continuity and disaster recovery concepts.

View Set

5 - Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Chapter 13 The Great Depression and The New Deal

View Set