Information Systems Parts 1 and 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following technologies allows a virtual team to communicate asynchronously? 1. E-mail 2. Videoconferencing 3. Web conferencing 4. Telephone call 5. Webinar

1. E-mail

If a business wants to supervise and coordinate all of the company's operations, it will use 1. ERP 2. CRM 3. SCM 4. EDI 5. GIS

1. ERP

Which of the following sentences is FALSE about ASCII character set: 1. It can represent 256 different characters 2. It includes codes for non-printing characters 3. Capital and small letters differ only in one bit 4. Numbers are codified in a way that the last four bits of the ASCII binary value correspond to the numeric value of the character

1. It can represent 256 different characters

Which one of the following is not a goal of green computing? 1. Reducing the number of people suffering from computer use related illnesses 2. Reducing the power consumption of computers and peripherals 3. Reducing the waste generated by computer replacements 4. Reducing the amount of toxic materials used in computer components 5. Reducing the pollution generated by computer manufacturing

1. Reducing the number of people suffering from computer use related illnesses

With only a hyperlink in an HTML page it is NOT possible to... 1. print the current Web page 2. jump to another section of the same page 3. send an e-mail 4. open another Web page in the same window 5. open another Web page in a different window

1. print the current Web page

kilobyte

1000 bytes

zotabytes

1000 exabytes

terabyte

1000 gigabytes

megabyte

1000 kilobytes

gigabyte

1000 megabytes

exabyte

1000 petabytes

petabyte

1000 terabytes

yottabyte

1000 zotabytes

What is a standard for fast ethernet

100BaseT

Select the CORRECT statement about Web servers 1. A Web server and a Web site are the same thing 2. A Web site can be attended by several Web servers 3. A Web server can host only one Web site 4. A Web server uses HTTP to serve encrypted Web pages 5. HTML can be used to send Web pages from server to browser

2. A Web site can be attended by several Web servers

The predominant EDI standard in the USA is 1. UN/EDIFACT 2. ANSI ASC X12 3. ODETTE 4. TRADACOMS 5. VDA

2. ANSI ASC X12

If a business wants to to manage all the information that it has about its customers, it will use 1. ERP 2. CRM 3. SCM 4. EDI 5. GIS

2. CRM

If we want to make an uneditable digital copy of a paper report, we have to use: 1. OCR Scanning 2. Document Imaging 3. Desktop publishing 4. Word processing 5. Traditional photocopying

2. Document Imaging

The program that created a nationwide network that developed as a major part of the first Internet backbone was called: 1. ARPANET 2. NSFNET 3. CSNET 4. WWW 5. ULTRANET

2. NSFNET

The main function of the mail merge tool that we can find in a Word Processor is: 1. Emailing a single copy of the document to a user 2. Sending a document to different users with some personalized fields. The emails of the recipients and the values of the personalized fields will be taken from an independent list. 3. Emailing the same copy of a document to different users 4. Creating lists of emails 5. Merging different emails in a unique document

2. Sending a document to different users with some personalized fields. The emails of the recipients and the values of the personalized fields will be taken from an independent list.

If we are seeing a video online without waiting for the content to be completely downloaded we are using: 1. FTP 2. Streaming 3. Enqueuing 4. Filtering 5. P2P

2. Streaming

A GIS is NOT suitable for: 1. Mapping underground cables and pipes 2. Supporting business decisions making 3. Developing evacuation plans 4. Managing agricultural lands 5. Getting cadastral information

2. Supporting business decisions making

Which sentence is true about memory cards? 1. They have reached a standard with SD 2. They have no unique standard but SD seems to be prevailing over the other standards 3. There is no need for a standard format since adapters were introduced in the market 4. They can only be used in digital photo cameras 5. They have much lower capacities than USB flash

2. They have no unique standard but SD seems to be prevailing over the other standards

With current presentation packages, can we embed a video from Internet in a presentation without downloading it? 1. Yes, and it will always be shown 2. Yes, but we must check that it will be online at the moment of using the presentation and that we can access it from where we are presenting, as firewall or other configuration problems may arise 3. No, we have to download it first to embed it 4. Only if it is stored in a local server 5. No, it is impossible

2. Yes, but we must check that it will be online at the moment of using the presentation and that we can access it from where we are presenting, as firewall or other configuration problems may arise

An antivirus belongs to the category of 1. operating system 2. utility software 3. software drivers 4. malware 5. office software

2. utility software

What is the minimum number of satellites in sight to get a position on the earth surface, that is, without altitude?

3

Which characteristic of an operating system maximizes the performance of a computer? 1. Memory management 2. Communication with hardware devices through drivers 3. Arbitration concurrent access to shared resources 4. User process monitoring 5. Network management

3. Arbitration concurrent access to shared resources

Which of the following sentences is FALSE? 1. Raster type layers in GIS systems contain some information per point in a big matrix 2. Vector layers in GIS systems contain entities like points, lines or polygons that can be altered 3. If we want to incorporate an aerial photo to a GIS system we have to use a vector layer 4. We can use x,y,z coordinates in a GiS system to specify the location of objects 5. We can use latitude, longitude and elevation in a GiS system to specify the location of objects

3. If we want to incorporate an aerial photo to a GIS system we have to use a vector layer

Which of the following is an email client protocol that does NOT store the read messages on the server? 1. IMAP 2. Web mail 3. POP3 4. MIME 5. all of them store the read messages on the server

3. POP3

The logical construct created to identify an application or service in a host in TCP/IP is called 1. DNS 2. IPv4 3. Port 4. Hook 5. Server

3. Port

A specially designed Web site that brings information together from diverse sources such as news, weather, sports, events, etc.. in a uniform way is called: 1. Landing page 2. SERP 3. Portal 4. Home page 5. Hub

3. Portal

Which of the following systems should be used to manage the supply network for a company, including all raw materials and goods needed to make a product 1. ERP 2. CRM 3. SCM 4. EDI 5. GIS

3. SCM

TCP/IP is based on 1. Using leased lines 2. Switching circuits like the telephone network 3. Switching independent packets of data 4. Establishing permanent connections between network hosts 5. Sending streams of data directly from one host to another

3. Switching independent packets of data

With a threaded discussion list a group will be able to 1. make a videoconference 2. send messages to non-list members 3. discuss a topic over an extended period of time , keeping the messages organized by topic 4. share an online application to modify a document collaboratively 5. None of the above

3. discuss a topic over an extended period of time , keeping the messages organized by topic

A geostationary satellite orbits approximately:

36,000 km above the earth

How many layers are in the TCP/IP stack?

4

a Coaxial Cable has how many layers?

4

IPv4 uses how many bytes? IPv6?

4, 6

Which of these sentences about Unicode is FALSE 1. Unicode is big enough to represent any written character in the world 2. In Unicode all the characters have the same size in bytes. 3. Unicode can combine characters from different languages in a single document 4. A character can have several representations in Unicode 5. The numbers and letters present in ASCII character set are codified the same way in Unicode

4. A character can have several representations in Unicode

Which of the following is not an Internet related protocol? 1. DNS 2. TCP 3. HTTP 4. ATP 5. FTP

4. ATP

Which one of the following is something that CANNOT be done by installing multiple operating systems in our computer: 1. Being able to run Windows and LINUX on the same computer 2. Being able to run Windows XP and Windows 8 on the same computer 3. Being able to run a larger variety of applications 4. Being able to create multiple IP addresses for the computer 5. Being able to run a virtual server

4. Being able to create multiple IP addresses for the computer

Which of the following would NOT be considered secondary storage in a computer? 1. Internal hard disk 2. External flash memory card 3. DVD-R 4. CMOS memory 5. USB flash drive

4. CMOS memory

Which of the following sentences is FALSE: 1. Non-impact printers have mostly replaced impact printers 2. Line printers where faster than dot-matrix printers 3. Laser printers are faster than ink-jet printers 4. Dot-matrix printers are used for photo printing 5. Dot-matrix printers are impact printers

4. Dot-matrix printers are used for photo printing.

Which of these software applications is NOT one of the core components of an Office Suite? 1. Word Processor 2. Spreadsheet 3. Presentation program 4. Email client 5. Database manager

4. Email client

If we want to install a new software program in our computer, it is very probable that we will be guided by a: 1. Installation master 2. Installation supervisor 3. Installation tool pack 4. Installation wizard 5. Installation helper

4. Installation wizard

Which of the following departments is not related to CRM operations 1. Sales 2. Marketing 3. Customer service 4. Procurement 5. Technical support

4. Procurement

The technical standards applied in Internet are called: 1. FAQs 2. IEEE 3. ISO 4. RFCs 5. ASTC

4. RFCs

Which protocol enables us to control remote computers in a secure way 1. TELNET 2. FTP 3. WWW 4. SSH 5. GUI

4. SSH

Which sentence is incorrect? 1. An empty spreadsheet consists of a set of cells in an array, organized in rows and columns. 2. Data or information is entered in cells. 3. Data in cells can be numeric values or text information. 4. Usually the header of columns are letters, whereas rows are numbered. 5. A cell is not uniquely identified by its address.

5. A cell is not uniquely identified by its address

How can we connect a keyboard to a computer's central unit? 1. With a cable 2. Using a Bluetooth link 3. Using a RF link 4. Using a infrared link 5. All of the above

5. All of the Above

When you are managing the page layout of a document in a Word processor 1. You can add a page header 2. You can include numbers for all the pages 3. You can split the text into two or more columns 4. You can add a page footer 5. All of the above are correct

5. All of the above are correct

Which type of functions can we use in a modern spreadsheet? 1. Mathematical 2. Trigonometric 3. Financial 4. Text manipulation 5. All of the above are correct

5. All of the above are correct

Select the CORRECT statement about IP 1. IPv6 routes most Internet traffic today 2. IPv6 was developed because IPv4 was too slow 3. IPv4 will be replaced by IPv5 4. Both IPv4 and IPv6 are interoperable 5. IPv6 provides far more addresses than IPv4

5. IPv6 provides far more addresses than IPv4

What is push technology if we are talking about a Web server? 1. The action of manually downloading a file from the server 2. The automatic replacement of web content when it gets outdated 3. A technology that enables webmasters to remotely reboot the Web server 4. A technology to upload content to the Web server 5. Is a mechanism used by a Web site to automatically download data or files to

5. Is a mechanism used by a Web site to automatically download data or files to

Which of the following protocols adds multi-media content attachments capability to Internet email? 1. HTTP 2. SMTP 3. IMAP 4. POP3 5. MIME

5. MIME

Which of the following is not a core function of an operating system? 1. File management 2. Memory management 3. Process monitoring 4. Network access 5. Storage media defragmentation

5. Storage media defragmentation

Select the FALSE statement about expert systems 1. They use stored knowledge of human experts to simulate human reasoning and solve problems 2. You can access the reasoning process they have followed 3. They can incorporate multiple hypotheses at the same time 4. They are limited to narrow processes 5. They apply commonsense knowledge (the collection of facts and information that an ordinary person is expected to know)

5. They apply commonsense knowledge (the collection of facts and information that an ordinary person is expected to know)

Which protocol enables voice communication over the Internet 1. FTP 2. RVP 3. PBX 4. IpVoice 5. VoIP

5. VoIP

Which of the following is not a default feature of a modern Web browser? 1. Incognito mode 2. History tracking 3. Plugin extension 4. Tab navigation 5. Web page change detection

5. Web page change detection

How many OSI layers are there?

7

byte

8 bits

What is the newest Wi-Fi standard?

802.11ac

What WiFI standard is defined to work at 2.4 and 5 GHz bands?

802.11n

The code assigned to Ethernet in the IEEE Local Area Network Standard is

802.3

The maximum distance between the desktop connector and the floor cabinet patch pannel for twisted pair links is:

90 meters

If we have 8 desktop computers with a twisted pair Gigabit Network adapter each, the device that will connect them with the highest data rate per computer is:

A 1000Base-T switch

What is used to modify the surface of an optical disk when it is recorded?

A Laser

Which one of the following is NOT a network device name: A hub A bridge A router A gateway A viaduct

A Viaduct

A contextual menu in a graphical user interface is:

A menu whose content depends on what the user has clicked to make it appear

What is the most common antenna for communicating with a geostationary satellite?

A parabolic dish

The device that is used to connect several Ethernet stations using twisted pair cabling and sharing the same bandwidth is called:

A router

What is a PAN?

A set of connected devices around a person or desktop. (Personal Area Network)

What are some support tools found in a word processor?

A spelling checker, revision management capability, indexing assistance, and mail-merge capability

The mechanism used in packet transmission to avoid packets entering an infinite loop due to a bad configuration is:

A time-to-live field in packets that is decreased every time it goes through a network node, and that makes the network node discard them if it reaches 0.

Intranet web servers uses the same technology and protocols than Internet web servers, the main difference is

Access is restricted to company members

Which of the following is a hard disk format? FAT32 NTFS HFS ext3 All of the above

All of the above

Which of the following is a probable user of a Microwave link? Phone companies Wireless Internet service providers Private companies Government agencies All of the above

All of the above

Which of the following natural phenomenons can be represented by an analog signal? Sound Temperature Barometric pressure Position All of the above

All of the above

The Data layers in the OSI stack

Application layer, Presentation layer, Session layer

Layer 7 of OSI stack:

Application layer, deals with node specific applications

Which of the following is true about open-source software? Select all that apply: (A) It always provides product support. (B) Its source code is freely available. (C) It is copyrighted. (D) It is shareware.

B and C

Which of the following formats was developed for high definition video? CD-R DVD-R DVD-RW DVD+ Blu-Ray

Blu-Ray

BYOD stands for

Bring your own device

What are more stable? Peer 2 Peer networks or Centralized networks

Centralized network

What is a high level language for web design that converts into HTML?

ColdFusion

What does CRM stand for?

Customer Relationship Management

What does DCE stand for?

Data Communication Equipment

Layer 2 of OSI stack:

Data Link layer, connects the 2 hosts in direct communication

What does DMS stand for?

Document Management System

What are some WYSIWYG web design applications?

Dreamweaver, Frontpage

What does ERP stand for?

Enterprise Resource Planning

Which of the following is NOT a satellite positioning system? Navstar Beidou Glonass Galileo ExactNav

ExactNav

Which of the following components is NOT required for a LAN to work? Networking protocol stack Cabling standard Network interface card in stations Unique address for each node File server

File Server

What does FTP mean?

File Transfer Protocol

The use of arithmetical operators, numbers and cell references to obtain a value in a the cell of a spreadsheet is called:

Formula

What are the 3 parts of a packet? Which is optional?

Header, Data, and Footer. Footer is optional.

What is the name of the station that sets a WiFI network so the users can connect through it?

Hotspot

Which of the following are characteristics of a decision support system? I. It can be based in stored knowledge of human experts. II. It can be used to solve specific problems. III. It always finds the optimal solution to the problem. IV. Its main function is to help managers make decisions. V. It can help to evaluate different scenarios of a problem.

I, II, IV, V

Internet standards are made by

IETF

Which combination of the following devices is a DCE in a computer network? I. A printer II. A router III. A server IV. A hub V. A modem

II, IV, and V

In a DNS address the label with the highest hierachy is located

In the rightmost side

One of the main drawbacks of formatting a disk with FAT32 is:

It won't be able to store files bigger than 4 GB

Put in order according to size: WAN MAN LAN

LAN, MAN, WAN

What cellular technology gives the user the highest data rate?

LTE

What OSI layer does a Hub work at?

Layer 1

What OSI layer does a modem work at?

Layer 1

What OSI layer does a repeater work at?

Layer 1

What OSI layer does a Bridge work at?

Layer 2

What OSi layer does a switch work at?

Layer 2

Ethernet specification goes up to:

Layer 2 of the OSI stack

What OSI layer do routers work on?

Layer 3

What OSI layer does a router work at?

Layer 3

What OSI layer does a gateway work at?

Layer 4, 5, 6, or 7

In a database package if you want to automate a simple task you will use a:

Macro

What is the effect of sampling an analog signal?

Making it a discrete signal

Nowadays computers are based on:

Microchips

What wireless technology is most used for point to point communication?

Microwave links

A computer system with several CPUs that work simultaneously to execute parts of the same task or different independent tasks each is said to have:

Multiprocessing

Layer 3 of OSI stack:

Network layer, manages node networks

What is the name of the spreadsheet included in Mac office suite?

Numbers

The system to access external database drivers in Windows is called:

ODBC

What is a chipset?

One or more integrated circuits that manage the interactions between the CPU, the main memory, and other peripherals

What storage device uses a laser beam to read and write bits?

Optical disk

The 4 TCP/IP stack layers are:

Physical Network layer, Internet layer, Transport layer, and Application layer

Layer 1 of OSI stack:

Physical layer, sends stream of bits to other host

If we want to summarize the data stored in a spreadsheet table in a way that we get the results in another table that we can easily manipulate, we change the

Pivot Table

Layer 6 of OSI stack:

Presentation layer, deals with encryption and decryption

The standards made by IETF are called

RFCs

Data is transferred via Bluetooth using

Radio Waves

Which type of field will we select to store audio or video in a database?

Raw Binary

If an email tries to gain your confidence to defraud you, it is known as

SCAM

The structured language most commonly used to query databases is called:

SQL

What does SEM stand for?

Search Engine Marketing

What does SERP stand for in Internet searching?

Search Engine Results Page

Layer 5 of OSI stack:

Session layer, manages the conversation connection

In a presentation package a presenter view can be used to:

Show useful information for the speaker in a secondary monitor: next slide, notes, etc..

Which has more bandwith, a Single mode fiber or a Multi mode fiber?

Single mode fiber

What does SSD stand for?

Solid State Disk

What does SCM stand for?

Supply Chain Management

The data transmission protocol suite used to keep the Internet running is called:

TCP/IP

The part of a data packet that includes protocol related information is called

The Header

In the OSI protocol stack, the Application layer of host A communicates with the Application layer of host B through:

The Presentation layer of Host A

In a relational database an attribute is stored in:

The column of a table

When we install an application software in a computer we must be sure that it is compatible with

The operating system

How does GPS work?

The receiver doesn't transmit, it uses the signals from several satellites to calculate its location.

In the Client-Server architecture

The server receives commands from client computers and responds to them.

What is the main characteristic of the antennas used in microwave links?

They are very directional.

The main function of an operating system is

To provide a standard interface between applications and the computer hardware, acting as an isolation layer

What are RFID tags used for?

Toll collection, animal tracking, credit card use, inventory management

What poses a problem for wireless cellular networks?

Too many users on the same cell

The Transport Layers in the OSI stack

Transport layer, Network layer, Data link layer, and Physical layer

Layer 4 of OSI stack:

Transport layer, helps with errors and recovery between hosts

The TCP/IP stack connectionless transport layer protocol is called

UDP

The current version of the Universal Serial Bus specification (with a bandwidth of 10 Gb/s) is:

USB 3.1

What is the universal text format?

UTF-8

What does URL stand for?

Uniform Resource Locator

If we want to be sure that we transmit confidential data most securely over a public wireless network, we should:

Use a VPN to connect the other end using a wireless network.

What does VAN stand for?

Value Added Network

What does VPN stand for?

Virtual Private Network

If we want to link a corporate headquarters with its branch offices located in different states of the country we will use a:

WAN

The most advanced protocol used to authorize users in Wifi networks is called

WPA-2

If we use a spreadsheet to try out different alternatives in order to select one, we are doing a

What-if-Analysis

The most commonly used tool of an office suite is the

Word Processor

When you put the $ symbol in a Cell reference of a formula in a spreadsheet...

You are changing the type of the reference of a cell from relative to absolute

Bit

a 1 or a 0

If we want to have non-repudiation as an EDI transaction service so that when a message is sent the sender is registered, we will have to use:

a VAN

What technology is designed to transmit encrypted data from a branch office to a corporate headquarter using an unsecured public network:

a VPN

Which of the following tools can be used in cooperative work environments? I. E-mail II. Instant messaging III. Video conferencing IV. Wiki V. Document management system

all of them

If our computer suddenly loses power, the contents of its RAM memory will be:

lost

What is the name used for connecting two Bluetooth devices?

pairing

The three colors that can generate any other color when combined using emitted light are

red, blue, and green

The technology that allows a smartphone to share its cellular network data access using a Wifi connection is called:

tethering


Conjuntos de estudio relacionados

Level HiE - Reading Plues: The Mermaid Miracle

View Set

Chapter 33 PrepU: Assessment and Management of Patients with Allergic Disorders

View Set

Ch.13.4 Helpdesk: Keeping E-mail Secure

View Set

ECON131 Chapter 12: Money Creation and the Federal Reserve

View Set

Prefix Multipliers (Tera - Pico)

View Set

Chapter 5: Understanding Children from Birth to Age Two

View Set