BTE 210 FINAL
12. An example of a(n) ________________ protocol is SMTP. A. Application B. Internet C. Network interface D. Transport
A. Application
24. __________ is an identity theft technique. A. Dumpster diving B. Espionage C. Sabotage D. Vandalism
A. Dumpster diving
36.A byte is ______ bits. A.2 B.8 C.16 D.32
B. 8
22. Microsoft's "Clippy" was an example of __________. A. a GUI B. a social interface C. application software D. operating system software
B. a social interface
23. IaaS, PaaS, and SaaS shift IT from a(n) _________________ expense, which means IT is ____________ cost. A. capital to an operating; fixed rather than variable B. capital to an operating; variable rather than fixed C. operating to a capital; fixed rather than variable D. operating to a capital; variable rather than fixed
B. capital to an operating; variable rather than fixed
43. A firewall is a _______ control. A. access B. communication C. physical D. virtual
B. communication
36. Scalability benefits organizations by ______________. A. creating a competitive advantage B. improving organizational flexibility C. positively impacting employees D. saving money
B. improving organizational flexibility
3. The Turing test involves a human and computer ______________. A. answering the phone B. interviewing C. playing Jeopardy! D. playing chess
B. interviewing
32. You want to convince a potential customer that your products are better than your top competitor. You want to show pictures comparing the products, pie charts illustrating your market share compared to theirs, etc. To do this, you would use a __________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing
B. presentation
48. An evil twin attack is a type of ___________. A. eavesdropping B. rogue access point C. radio-frequency jamming D. war driving
B. rogue access point
45. A collection of web services constitutes a ___________. A. self-service architecture B. service-oriented architecture C. service-level package D. Software-as-a-Service package
B. service-oriented architecture
27. ___________ speech-recognition software interprets human speech one word at a time. A. Continuous B. Conversational C. Discrete D. Interpretation
C. Discrete
31. Which of the following is an example of a metasearch engine? A. Boardreader B. CrunchBase C. Dogpile D. Google
C. Dogpile
8. The most popular BI tool is _______________. A. CRM B. ERP C. Excel D. Word
C. Excel
26. Which of the following is NOT a KPI? A. Operational costs B. Overhead C. Product quality D. ROI
C. Product quality
10. _____________ is a disadvantage of twisted-pair wire. A. Difficult to work with B. Relatively expensive and inflexible C. Subject to interference D. All of the above are disadvantages
C. Subject to interference
6. A disadvantage of a microwave transmission system is ____________. A. Creates electrical interference problems B. Signals experience propagation delay C. Susceptible to environmental interference D. none of the above
C. Susceptible to environmental interference
9. Wireless is a(n) inherently _________ network. A. trusted B. neutral C. untrusted D. useful
C. untrusted
12. The biggest challenge for Skybox is ________. A. collecting data B. competition C. expenses D. government regulation
D. government regulation
47. Which of the following is a DRAWBACK of e-learning? A. cost B. delivery C. flexibility D. interaction
D. interaction
48. Which of the following is a BENEFIT of e-learning? A. computer literacy B. integrity C. interaction D. learning time
D. learning time
30. ___________ uses fuzzy logic. A. Amazon B. Facebook C. Google D. Twitter
27. Airline predictions are off by an average of _______. A. 7 minutes B. 57 minutes C. 2 hours D. 4 hours
A. 7 minutes
27._____________________ is the most common input device for text and numerical data. A.A keyboard B.A touch screen C.A web camera D.Voice-recognition
A. A keyboard
32.The __________________ performs the mathematic calculations and makes logical comparisons. A.ALU B.Control unit C.Primary storage D.Registers
A. ALU
3. _______________ is the only major carrier in the US that offers seamless offloading to Wi-Fi networks. A. AT&T B. Spring C. T-Mobile D. Verizon
A. AT&T
12. Which of the following is NOT one of the most dangerous employees to information security? A. Accountants B. HR employees C. Janitors D. MIS employees
A. Accountants
52. Which of the following is NOT a positive of MOOCs for students? A. Accredited degree options B. Cost C. Self-pacing D. Social interaction
A. Accredited degree options
11. You are a doctor at a successful practice in the US. You are contacted by WebMD.com to provide your expertise on your successful new cancer identification technique. This is considered knowledge _______. A. Acquisition B. Inferencing C. Representation D. Transfer
A. Acquisition
41. The advantage of ________________ is they can be read over greater distances. A. Active RFID tags B. Passive RFID tags C. QR codes D. WSNs
A. Active RFID tags
18. ________ is a type of systems software. A. An operating system B. Personal information management C. Speech-recognition software D. Word processing
A. An operating system
13. The ____________ protocol enables client application programs to access the other layers. A. Application B. Internet C. Network interface D. Transport
A. Application
9. Blackstone Group initially focused on the most depressed housing markets in ________. A. Atlanta, GA B. Detroit, MI C. Las Vegas, NV D. Seattle, WA
A. Atlanta, GA
17.Which of the following is NOT an example of a supercomputer or mainframe application? A.Augmented reality technologies B.Corporate payroll programs C.Student grade calculation and reporting D.Web site transaction processing systems
A. Augmented reality technologies
20. The International Olympic Committee selected ___________ to build and manage the Wi-Fi network for the 2014 Winter Games A. Avaya B. Cisco C. Netgear D. Ooma
A. Avaya
12.The ____________ phenomenon addresses the use of personal devices at work. A.BYOD B.CIC C.RFID D.SFA
A. BYOD
23. Which of the following is NOT a value-adding attribute of mobile computing? A. Bandwidth improvement B. Instant connectivity C. Localization D. Ubiquity
A. Bandwidth improvement
15. An expert system's ______________________ is like a database. A. Blackboard B. Explanation subsystem C. Knowledge base D. Inference engine
A. Blackboard
42. Intelligent agents are also called _________. A. Bots B. Expert systems C. Smart systems D. Spammers
A. Bots
26. ____________ refers to the fact that when users carry an open mobile device, they can be reached instantly, even across great distances. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity
A. Broad reach
16. Which of the following is TRUE of open-source software? A. Bugs tend to be fixed quickly. B. Businesses may have to depend on volunteers or contractors for upkeep. C. It doesn't require a license. D. It is easy to use.
A. Bugs tend to be fixed quickly.
5. ___________ is a subset of BI according to Thomas Davenport. A. Business analytics B. OLAP C. Querying D. Reporting
A. Business analytics
44. A shopping bot is also called a _____________ agent. A. Buyer B. Personal C. Predictive D. Seller
A. Buyer
18. ________________ is access to the internet through your TV connection. A. Cable modem B. Dial-up C. DSL D. FTTH
A. Cable modem
6. Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014? A. China is the leading hacking group that encourages similar behavior from other countries. B. It appears that it is impossible to secure the Internet. C. It is difficult, if not impossible, for organization to provide perfect security for their data. D. There is a growing danger that countries are engaging in economic cyberwarfare among themselves.
A. China is the leading hacking group that encourages similar behavior from other countries.
1. Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest? A. Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes B. Cloud and mobile computing, stand-alone PCs, enterprise computing, LANs (client/server computing), mainframe and dumb terminals, stand-alone mainframes C. Stand-alone mainframes, mainframe and dumb terminal, LANs (client/server computing), enterprise computing, stand-alone PCs, cloud and mobile computing D. Stand-alone mainframes, mainframe and dumb terminal, stand-alone PCs, LANs (client/server computing), enterprise computing, cloud and mobile computin
A. Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes
7. This stage in the evolution of the modern IT infrastructure was characterized by sharing pools of resources over a network, usually the internet. A. Cloud computing B. Enterprise computing C. LANs (client/server computing) D. Mainframe and dumb terminals
A. Cloud computing
47. If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site. A. Cold B. Hot C. Neutral D. Warm
A. Cold
26. _______________________ speech-recognition software recognizes and interprets conversational streams. A. Continuous B. Conversational C. Discrete D. Interpretation
A. Continuous
50. Security must be balanced with _________ for people to use systems. A. Convenience B. Cost C. Time D. Trust
A. Convenience
3. Which of the following is NOT a reason it is so difficult to transition away from a twisted-copper wire network for telecommunications? A. Cost B. FCC guarantees C. Power requirements D. Safety
A. Cost
49.Which of the following is NOT an advantage of solid state drives over hard drives? A.Cost B.Heat production C.Power use D.Speed
A. Cost
43. Anonymity on the internet enhances the problems associated with _______. A. Criminal use of cloud computing B. Legacy IT systems C. Reliability of cloud computing services D. The regulatory and legal environment
A. Criminal use of cloud computing
37. If a genetic algorithm recommends spending more on marketing and calling customers directly to improve product sales, you would be using the __________ functional characteristic of a genetic algorithm. A. Crossover B. Expertise C. Mutation D. Selection
A. Crossover
29. Alaska Airlines used ______________ to solve their flight delay problems. A. Crowdsourcing B. Insourcing C. Nearshore outsourcing D. Offshore outsourcing
A. Crowdsourcing
27. Which of the following is NOT an example of a machine learning system? A. Customer detection B. Face recognition C. Fraud detection D. Spam recognition
A. Customer detection
20. Which of the following is NOT a BI tool? A. Data dictionary B. Data mining C. Data visualization D. Dashboards
A. Data dictionary
3. Which of the following is NOT a benefit of PLOT for ConocoPhillips? A. Data variability B. Improved revenue C. Increased production D. Reduced greenhouse emissions
A. Data variability
29. ____________________ extend(s) word processing software to allow production of finished, camera-ready documents, which may contain photos, diagrams, and other images. A. Desktop publishing B. Graphics C. Personal finance D. Web authoring
A. Desktop publishing
24. Data marts are used to __________________. A. Develop few, related BI applications B. Develop infrastructure to support enterprisewide BI C. Support business analytics as a subcategory of BI D. Support organizational transformation
A. Develop few, related BI applications
5. Which of the following is a characteristic of natural intelligence? A. Difficult and expensive to duplicate and disseminate knowledge B. Limited use of sensory experiences C. Low creativity D. Reasoning is only good in narrow, focused, and stable domains
A. Difficult and expensive to duplicate and disseminate knowledge
12. Which of the following is an informational role? A. Disseminator B. Disturbance handler C. Entrepreneur D. Figurehead
A. Disseminator
33. Which of the following is NOT a telemedicine model used by the Miami Children's Hospital? A. Dynamic B. Extremely static C. Mobile D. Semistatic
A. Dynamic
46. Which of the following is NOT a web service protocol? A. EDI B. SOAP C. XML D. UDDI
A. EDI
43. ____________ is NOT a benefit of RFID for Marks & Spencer. A. Efficient production B. Inventory accuracy C. Inventory turnover D. Out-of-stock products
A. Efficient production
6. Systems like ERP, CRM, and SCM were introduced in the _________ stage in the evolution of the modern IT infrastructure. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe
A. Enterprise computing
9. ___________ are the most widely applied and commercially successful intelligent systems. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks
A. Expert systems
17. VPN is a type of ________________. A. Extranet B. Internet C. Intranet D. None of the above
A. Extranet
24.If ________ clients lose access to the internet, they are still useable. A.Fat B.Heavy C.Skinny D.Thin
A. Fat
51. Which of the following is a positive of MOOCs for universities? A. Filtering of student questions B. Handling diversity C. Pass rate D. Revenues
A. Filtering of student questions
9. ______________ satellites are the most expensive to build and launch. A. GEO B. LEO C. MEO D. SEO
A. GEO
38. __________ analysis focuses on the outputs rather than the inputs. A. Goal-seeking B. Sensitivity C. Solution D. What-if
A. Goal-seeking
39. Suppose you want to ensure your Northwest Division generates at least $2 million in revenue. You then use _____________ analysis to determine how much advertising dollars and how many salesmen need to be hired. A. Goal-seeking B. Sensitivity C. Solution D. What-if
A. Goal-seeking
13. _____________________ computing makes scalability easier. A. Grid B. Mainframe C. Mobile D. Utility
A. Grid
37. The Internet of Things is also called the _______. A. Industrial Everywhere Internet B. Internet of Anything C. Internet of Everything D. M2M Communication
A. Industrial Everywhere Internet
43. ________ agents search for information and display it to users. A. Information B. Monitoring and surveillance C. Personal D. User
A. Information
45. Amazon uses a(n) ____________ agent for its recommendation system. A. Information B. Monitoring and surveillance C. Personal D. User
A. Information
8.________________ technologies accept data and instructions and convert them to a form that the computer can understand. A.Input B.Primary C.Output D.Secondary
A. Input
23. Which of the following is FALSE of Google Fiber? A. It brings high-speed broadband to low-income "fiberhoods" for free. B. It has been rejected by some cities who prefer to install fiber themselves. C. It may create a new era for privately built broadband. D. It provides ultrafast speed and storage space for DVR recording.
A. It brings high-speed broadband to low-income "fiberhoods" for free.
18. Wi-Fi is a ______________. A. LAN B. MAN C. PAN D. WAN
A. LAN
6. Your school's main campus network is a ___________. A. LAN B. MAN C. PAN D. WAN
A. LAN
37. If your IT department doesn't want to move to cloud computing because they don't want to learn how to manage and maintain a new system, this reflects the following cloud computing concern: A. Legacy IT systems B. Privacy C. Reliability D. Security
A. Legacy IT systems
46.Hard drives are a type of _____________ that are ______________ access. A.Magnetic disks; direct B.Magnetic disks; sequential C.Magnetic tapes; direct D.Magnetic tapes; sequential
A. Magnetic disks; direct
41.ROM is ____________ storage that is _______________. A.Primary; non-volatile B.Primary; volatile C.Secondary; non-volatile D.Secondary; volatile
A. Primary; non-volatile
17. The yearly employee evaluation is a(n) __________________ problem. A. Semistructured B. Structured C. Unistructured D. Unstructured
A. Semistructured
30. Apple's iBeacon uses ___________ wireless network technology to provide location- aware, contextual information to users. A. Short-range B. Local-area C. Medium-range D. Wide-area
A. Short-range
40. You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy. A. acceptance B. analysis C. limitation D. transference
A. acceptance
2. ConocoPhillips addressed employee resistance to using PLOT by ____________. A. centralizing the monitoring process B. decentralizing the monitoring process C. hiring better employees D. firing those people
A. centralizing the monitoring process
13.Portable computers and advanced ___________ have enabled employees to work from home or from anywhere. A.communication technologies B.input technologies C.output technologies D.primary storage devices
A. communication technologies
30. Search engines use indexes created by web _________ to provide fast searches. A. crawlers B. indexers C. searchers D. users
A. crawlers
49. Using a hotspotter is useful for _____________. A. creating a rogue access point B. eavesdropping C. radio-frequency jamming D. war driving
A. creating a rogue access point
41. The Doritos' customer-created Super Bowl commercials are an example of _________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow
A. crowdsourcing
44. Telepresence requires _________ and costs have ________ in the last 10 years. A. dedicated rooms; decreased B. dedicated rooms; increased C. tele- and video-conferencing capabilities; decreased D. tele- and video-conferencing capabilities; increased
A. dedicated rooms; decreased
5. Modern smartphones exhibit a process called __________, which means the functions of many physical devices are included in one other physical device. A. dematerialization B. materialization C. multi-tasking D. tasking
A. dematerialization
31. The goal of CAPTCHA is to ___________. A. ensure you aren't alien software B. hack into secure networks C. protect networks against hackers D. remove alien software from your computer
A. ensure you aren't alien software
40. Intelligent agents often use _________ behind the scenes. A. expert systems and fuzzy logic B. expert systems and genetic algorithms C. fuzzy logic and neural networks D. fuzzy logic and genetic algorithms
A. expert systems and fuzzy logic
22. Vertical clouds are similar to ___________. A. extranets B. intranets C. internets D. suppliernets
A. extranets
54. By hiring FireEye to improve their security, Target adopted a risk _________ strategy; This strategy was ___________. A. limitation; a failure B. limitation; successful C. transference; a failure D. transference; successful
A. limitation; a failure
33. You use Quicken to track your investments. This is a type of ________ personal application software. A. personal finance B. personal information management C. presentation D. spreadsheet
A. personal finance
31. If you want to ensure you get everything done by the end of the semester, you would use a ___________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing
A. personal information management
16.Which of the following is an example of what a server does? A.Processing email B.Running spreadsheets C.Tracking user activity D.Word processing
A. processing email
From smallest to largest, which of the following is in the correct order? A.KB, MB, GB, TB, PB, EB, ZB B.KB, MB, TB, GB, PB, EB, ZB C.MB, KB, GB, TB, PB, EB, ZB D.MB, KB, TB, GB, PB, EB, ZB
A.KB, MB, GB, TB, PB, EB, ZB
50.CDs are an example of _________.A.Optical storage devicesB.Magnetic disksC.Magnetic tapesD.Solid-state drives
A.Optical storage devices
10. On average, professional programmers make around _________ errors in every 1000 lines of code they write. A. 10 B. 100 C. 250 D. 500
B. 100
37. A kilobyte is _____________ bytes. A.1000 B.1024 C.1,000,000 D.1,000,024
B. 1024
3. The first software applications for computers in business were developed in the early _____. A. 1940s B. 1950s C. 1960s D. 1970s
B. 1950s
20. __________________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. A. Application software B. A GUI C. Open-source software D. Operating systems software
B. A GUI
9. Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today. A. AI B. BYOD C. ERP D. RFID
B. BYOD
31. Cardlytics services the ________ industry. A. Automobile B. Banking C. Healthcare D. Housing
B. Banking
30. Which of the following is NOT an example of alien software? A. Adware B. Blockware C. Spamware D. Spyware
B. Blockware
43. The color ___________ in the Management Cockpit represents performance of internal processes and employees. A. Black B. Blue C. Red D. White
B. Blue
4. _________________ manages the internet connections for North Korea and could stop hacking attempts on the US. A. Australia B. China C. India D. Russia
B. China
5. Which country is currently in a dispute with the US over bilateral hacking? A. Australia B. China C. India D. United Kingdom
B. China
27. Lycos is an example of a________________ portal. A. Affinity B. Commercial C. Corporate D. Industrywide
B. Commercial
24. The internet in _____________ is among the most tightly controlled in the world. A. China B. Cuba C. Russia D. Vietnam
B. Cuba
15. Validation of the model occurs in the _______ phase of the IDC. A. Choice B. Design C. Implementation D. Intelligence
B. Design
34. Which of the following is a use of genetic algorithms? A. Identifying income categories B. Designing processes C. Financial analysis D. Preventing money-laundering
B. Designing processes
40. _____________________ is the ability to go to details, at several levels; it can be done by a series of menus or by clicking on a drillable portion of the screen. A. CSF B. Drill down C. KPI D. Trend analysis
B. Drill down
37. To increase employee productivity, Atos banned __________. A. Breaks B. Email C. Internet use D. Online social networking
B. Email
18. OpenSSL is __________ software. A. Banking B. Encryption C. Hacking D. Free
B. Encryption
4. Which of the following is TRUE of software? A. Complexity has decreased B. Errors are more common C. It takes less time to program D. Price has decreased
B. Errors are more common
36. The ___________ model utilizes kiosks to open new market opportunities for the Miami Children's Hospital in offsite locations like malls and shopping centers. A. Dynamic B. Extremely static C. Mobile D. Semistatic
B. Extremely static
22.You purchased a laptop and installed Word, Excel, Outlook, and other useful applications on it; this makes your laptop a _______________-clientsystem. A.Cloud B.Fat C.Thin D.Open
B. Fat
52. __________ is a computer security firm that sells malware detection tools to companies like Target. A. Heartbleed B. FireEye C. Shodan D. SpyEye
B. FireEye
31. _______________ is best for handling "gray" decision-making problems. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks
B. Fuzzy logic
46. In the lost hiker example, which of the following was NOT used to improve the ArcGIS suggestions? A. Facebook B. Google C. Park ranger knowledge D. Twitter
B. Google
1. Which hacker group successfully attacked Sony Picture Entertainment on November 24, 2014? A. Anonymous B. Guardians of Peace C. Hackweiser D. Legion of Doom
B. Guardians of Peace
4. ____________ is NOT categorized as BI. A. Applications B. Hardware C. Processes D. Technologies
B. Hardware
19. _________ is NOT a desktop operating system. A. Google Chrome B. IBM Cloud C. Linux D. Microsoft Windows
B. IBM Cloud
54. Network neutrality means _____________________. A. Countries are not allowed to attack each other on the internet. B. ISPS must allow customers equal access to content and applications, regardless of the source or nature of the content. C. Networks don't work against each other. D. All of the above
B. ISPS must allow customers equal access to content and applications, regardless of the source or nature of the content.
24. _____________________________ is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model. A. DaaS B. IaaS C. PaaS D. SaaS
B. IaaS
25. With ____________, the customer manages the operating system. A. DaaS B. IaaS C. PaaS D. SaaS
B. IaaS
26. With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking. A. DaaS B. IaaS C. PaaS D. SaaS
B. IaaS
13. __________, the same operating system with compatible software is installed on all computers that interact within an organization. A. In an ideal world B. In an open system C. With open-source software D. With proper software licensing
B. In an open system
32. SCADA attacks typically occur on ___________. A. Hacker networks B. Industrial control systems C. Personal computers D. Government networks
B. Industrial control systems
20. Google created a code fix for the Heartbleed bug. Which of the following is a TRUE statement? A. Home internet routers should be largely safe from this bug since they don't exchange enough sensitive data to be a target. B. Industrial control systems are highly vulnerable since they are updated infrequently. C. Organizations simply have to install the fix. D. Organizations need to install the fix and just create new private key-public key pairs.
B. Industrial control systems are highly vulnerable since they are updated infrequently.
16. The ________________ is a network of networks. A. Extranet B. Internet C. Intranet D. None of the above
B. Internet
14. An expert system's ______________________ is composed of facts and rules. A. Explanation subsystem B. Knowledge base C. Inference engine D. User interface
B. Knowledge base
19. ______________________ is NOT a benefit of an expert system. A. Knowledge accessibility B. Liability C. Productivity D. Reliability
B. Liability
47.___________ is the cheapest form of memory. A.Cache B.Magnetic disk C.Magnetic tape D.RAM
B. Magnetic disk
18.___________ have the highest performance and greatest reliability A.Laptop computers B.Mainframes C.Microcomputers D.Tablets
B. Mainframes
10. Which of the following is FALSE? A. It is easier to be a hacker nowadays. B. Mainframes make it easy to communicate freely and seamlessly with everyone. C. Management doesn't always support security efforts. D. Thumb drives make it easy to steal huge amounts of sensitive information.
B. Mainframes make it easy to communicate freely and seamlessly with everyone.
15. Hotspots are an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area
B. Medium-range
16. Which of the following is a medium-range wireless network? A. Bluetooth B. MiFi C. NFC D. UWB
B. MiFi
27. ______________________ refers to the real-time connection between a mobile device and other computing environments. A. Location-based commerce B. Mobile computing C. Mobile commerce D. Telemetry
B. Mobile computing
25.Which of the following is an example of an output technology? A.Keyboard B.Monitor C.Mouse D.Trackball
B. Monitor
15. ____________________ are/is available at no cost to developers or users. A. Hardware B. Open-source software C. Open systems D. Proprietary software
B. Open-source software
18. ___________________ control is executing specific tasks efficiently and effectively. A. Management B. Operational C. Strategic D. Tactical
B. Operational
28. _____________________ allow(s) users to create and maintain calendars, appointments, to-do lists, and business contacts. A. Data management B. Personal information management C. Presentation D. Spreadsheets
B. Personal information management
28. Which of the following is NOT a reason for flight delays? A. Passengers B. Pilots C. Weather D. Wind
B. Pilots
31.___________ use computer-directed pens for creating high-quality images, blueprints, schematics, drawing of new products, etc. A.Monitors B.Plotters C.Pocket projectors D.Printers
B. Plotters
6.____________________ storage temporarily stores data and program instructions during processing. A.Input B.Primary C.Output D.Secondary
B. Primary
39. Unlike private clouds, public clouds have a problem with ________. A. Legacy IT systems B. Privacy C. Reliability D. Security
B. Privacy
18. ________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications. A. Hybrid B. Private C. Public D. Vertical
B. Private
19. A ________________ cloud is also called a corporate cloud. A. Hybrid B. Private C. Public D. Vertical
B. Private
21. ______________ clouds are the most secure because they can be placed behind an organization's firewall. A. Hybrid B. Private C. Public D. Vertical
B. Private
34. Which of the following is a benefit of cloud computing? A. Privacy B. Productivity C. Reliability D. Security
B. Productivity
35. Which of the following is a benefit of telecommuting for employees? A. Increased productivity B. Reduced stress C. Retaining skills D. All of the above
B. Reduced stress
33.Which of the following types of primary storage is part of the CPU? A.Cache memory B.RAM C.Registers D.ROM
B. Registers
48. __________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML. A. HTML B. SOAP C. UDDI D. WSDL
B. SOAP
26. To access the internet ILLEGALLY, Cuban citizens can _________. A. Pay $5 per hour B. Share user accounts C. Show their national ID D. Sign agreements
B. Share user accounts
4. Which of the following is NOT a major advantage of wireless devices to users? A. They are small enough to easily carry or wear. B. They can be used to copy and pass on confidential information. C. They can communicate wirelessly with the Internet and other devices. D. They have sufficient computing power to perform productive tasks.
B. They can be used to copy and pass on confidential information.
21. Icons on your desktop are an example of _____________________. A. application software B. a GUI C. input hardware D. operating system software
B. a GUI
33. Shodan's primary purpose is ___________. A. a hacker website B. a service that searches the internet for devices connected to the internet C. a website that shows which devices are vulnerable to hackers D. to help users search for other people who use similar devices
B. a service that searches the internet for devices connected to the internet
24. ________________________________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. A. A GUI B. A software suite C. Personal application software D. Speech-recognition software
B. a software suite
25. Cuban citizens primarily have access to _____________. A. an extranet B. an intranet C. the internet D. nothing internet-related
B. an intranet
10. Expert systems ______ replace human experts by applying expertise in a _____ domain. A. can; general B. can; specific C. cannot; general D. cannot; specific
B. can; specific
42. The purpose of SpyEye is to _____________. A. catch hackers in the act of hacking B. collect personal and financial information C. facilitate SCADA attacks by seeing which systems are vulnerable D. watch what you do on your computer
B. collect personal and financial information
22. Neural networks are best used for analyzing ________ data. A. complex, complete B. complex, incomplete C. simple, complete D. simple, incomplete
B. complex, incomplete
46. Which of the following is a DRAWBACK of e-learning? A. content B. computer literacy C. delivery D. flexibility
B. computer literacy
30. GE's goal for Flight Quest is to ____________. A. alter the practices and official handbooks of air traffic controllers B. create smart assistants for pilots C. own the data created by airlines D. replace pilot decisions
B. create smart assistants for pilots
1. ConocoPhillips uses ________ to monitor _________ data. A. dashboards; historical B. dashboards; real-time C. data warehouses; historical D. data warehouses; real-time
B. dashboards; real-time
1. Hardware costs have been _______________ over time and software costs have been _______________ over time. A. decreasing; decreasing B. decreasing; increasing C. increasing; decreasing D. increasing; increasing
B. decreasing; increasing
27. A ___________ is a remote attack needing no user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack
B. denial-of-service attack
39. Atos' Zero Email initiative banned __________ as a form of communication _________. A. email; externally B. email; internally C. social networking; externally D. social networking; internally
B. email; internally
14. Weak passwords are a(n) ___________ threat. A. outside B. employee C. hardware D. software
B. employee
46. _________ is one common example of SSL. A. http B. https C. www D. wwws
B. https
15. BitTorrent is an example of P2P that ____________________. A. accesses unused CPU power among network computers B. is open-source, free, P2P file sharing C. is real-time, person-to-person collaboration D. does all of the above
B. is open-source, free, P2P file sharing
2. Hardware has become _______ complex over time; software has become _________ complex over time. A. less; less B. less; more C. more; less D. more; more
B. less; more
52. Facebook has discovered __________ are the most effective way of reaching consumers. A. banner ads B. native ads C. pop-under ads D. pop-up ads
B. native ads
47. Which of the following is NOT a major threat to wireless networks? A. eavesdropping B. tapping C. rogue access points D. radio-frequency jamming
B. tapping
40.Primary storage does NOT store the following: A.Data to be processed by the CPU B.Information for the organization's ERP system C.Instructions for the CPU as to how to process the data D.Operating system programs that manage various aspects of the computer's operation
B.Information for the organization's ERP system
34.Moore's law predicted microprocessor complexity would double approximately every _______ months. A.6 B.12 C.18 D.24
C. 18
8. Users began bringing their own PCs to work in the ______ to improve their _________. A. 1960s; productivity B. 1960s; profitability C. 1970s; productivity D. 1970s; profitability
C. 1970s; productivity
47. _____ percent of GIS users employ Environmental Systems Research Institute products. A. 20 B. 50 C. 70 D. 100
C. 70
1. The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels through Wi-Fi. A. 25 B. 50 C. 75 D. 100
C. 75
49. ___ percent of organizational breaches exploit weak or stolen user credentials. A. 26 B. 51 C. 76 D. 99
C. 76
30._____________________ is a source-data automation input device. A.A digital pen B.A graphics tablet C.A point-of-sale terminal D.Voice recognition
C. A point-of-sale terminal
28.____________ is a human data-entry device. A.An ATM B.A barcode scanner C.A trackball D.RFID
C. A trackball
28. A(n) ____________ portal is for critical business information inside and outside the organization. A. Affinity B. Commercial C. Corporate D. Industrywide
C. Corporate
34. Which of the following is NOT a disadvantage of web-based call centers located overseas? A. Communication B. Control C. Cost D. Security
C. Cost
32. _________ are/is the largest-volume application running over the Internet. A. Blogs B. Chat rooms C. Email D. Voice
C. Email
55. __________________ is a supporter of network neutrality. A. AT&T B. Comcast C. FCC D. Verizon
C. FCC
11. ____________ purchased Skybox in 2014 to keep its maps updated. A. Amazon B. Facebook C. Google D. Microsoft
C. Google
21. ____________ is installing and operating ultrafast fiber-optic cable service. A. AT&T B. Comcast C. Google D. Verizon
C. Google
47. _______ describes how data should look on a web site; ______ describes data being exchanged between business partners. A. EDI; HTML B. EDI; XML C. HTML; XML D. XML; HTML
C. HTML; XML
10.Which of the following is NOT one of the most important issues for businesspeople in regard to hardware? A.What the hardware enables B.How it is advancing C.How much it costs D.How rapidly it is advancing
C. How much it costs
19. ___________ was implemented to address smartphones, since they are basically hand- held computers. A. IPv4 B. IPv5 C. IPv6 D. IPv7
C. IPv6
38. The adoption of __________ has been an important factor in the development of the Internet of Things. A. IPv1 B. IPv4 C. IPv6 D. IPv8
C. IPv6
9. _____________ is an advantage of twisted-pair wire. A. Difficult to tap B. Higher bandwidth C. Inexpensive D. Less susceptible to electromagnetic interference
C. Inexpensive
21. ___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. A. Competitive intelligence B. Espionage C. Information extortion D. Intellectual property
C. Information extortion
39. A(n) ____________________ is a software program that assists you in performing repetitive computer-related tasks. A. Expert system B. Genetic algorithm C. Intelligent agent D. Neural network
C. Intelligent agent
41. Microsoft's Clippy is an example of a(n)_______. A. Expert system B. Genetic algorithm C. Intelligent agent D. Neural network
C. Intelligent agent
29. Which of the following is a use of fuzzy logic? A. Combatting fraud B. Designing processes C. Internet searches D. Optimizing store displays
C. Internet searches
44. Biometrics is something the user _______. A. Does B. Has C. Is D. Knows
C. Is
31. Which of the following is NOT a reason cloud computing has a positive impact on employees? A. It allows employees to use whatever device they want. B. It gives them access to organizational information no matter where they are. C. It helps them save money since they can do everything on a single device. D. It increases their overall productivity.
C. It helps them save money since they can do everything on a single device.
44.Which of the following is FALSE of secondary storage?A.It is nonvolatile. B.It takes more time to retrieve data from it than from RAM. C.It is more expensive than primary storage. D.It can utilize a variety of media, each with its own technology.
C. It is more expensive than primary storage.
5. This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems. A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs
C. LANs (client/server computing)
19.__________ organizations typically utilize supercomputers .A.Small B.Medium C.Large D.Extra-large
C. Large
4. Which of the following is a characteristic of AI? A. Difficult and expensive to duplicate and disseminate knowledge B. Erratic and inconsistent total cost of knowledge C. Low creativity D. Knowledge isn't preserved well
C. Low creativity
8. ______________ satellites require medium-powered transmitters. A. GEO B. LEO C. MEO D. SEO
C. MEO
21.Which of the following is NOT a PC? A.Desktop personal computer B.Mac C.Mainframe D.Microcomputer
C. Mainframe
3. This stage in the evolution of the modern IT infrastructure was characterized by remote job entry. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe
C. Mainframe and dumb terminals
22. Which of the following is NOT a challenge mentioned in the case that Avaya faced when setting up the 2014 Sochi Winter Olympic Games? A. Delivering high-definition TV channels B. Handling an unprecedented number of mobile devices C. Managing language barriers between technicians and athletes D. Moving goods safely into Russia
C. Managing language barriers between technicians and athletes
28. Fuzzy logic is a branch of _________. A. Computer science B. Engineering C. Mathematics D. Philosophy
C. Mathematics
21. Which of the following is NOT a major BI vendor? A. Business Objects B. Cognos C. Microsoft D. SAS
C. Microsoft
29._________ is a gesture-based input device. A.A touchpad B.A trackball C.Microsoft Kinect D.Microsoft Office
C. Microsoft Kinect
33. Cloud computing can enable companies to collect massive amounts of data and then use sophisticated algorithms to make sense of that data to create better products and services. This characterizes which of the following benefits of cloud computing? A. Customizing products and services B. Expanding the scope of business operations C. Mining insights from data D. Responding quickly to market changes
C. Mining insights from data
34. The _____________ model at the Miami Children's Hospital is most appropriate for nonemergency, consultative services because the physician is limited to a visual examination. A. Dynamic B. Extremely static C. Mobile D. Semistatic
C. Mobile
24. ____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity
C. Mobility
4. Which of the following is NOT an overall trend in hardware? A.Cheaper B.Faster C.More complex D.Smaller
C. More complex
3.Computer technologies become obsolete _________ other organizational technologies. A.at the same time as B.less often than C.more quickly than D.irrelevantly different than
C. More quickly than
35. ____________________ randomly tries combinations and then evaluates the success or failure of each outcome. A. Crossover B. Expertise C. Mutation D. Selection
C. Mutation
14. Which of the following is the technology that enables most mobile wallet applications? A. AFC B. ERP C. NFC D. VRP
C. NFC
14. The ____________ protocol places packets on, and receives them from, the network medium. A. Application B. Internet C. Network interface D. Transport
C. Network interface
34. Multidimensional analysis is also called ________. A. DSS B. ERP C. OLAP D. OLTP
C. OLAP
25. Personal application software is an example of ____________. A. Customized application software B. Customized systems software C. Off-the-shelf application software D. Off-the-shelf systems software
C. Off-the-shelf application software
31. Retailers that use location-based services like iBeacon favor a(n) ___________ option to avoid alienating customers. A. L-commerce B. M-commerce C. Opt-in informed consent D. Opt-out informed consent
C. Opt-in informed consent
33. A genetic algorithm is a(n) ___________ method. A. Biological B. Minimizing C. Optimizing D. Philosophical
C. Optimizing
9.______________________ technologies present data and information in a form people can understand. A.Input B.Primary C.Output D.Secondary
C. Output
4. From smallest to largest, which of the following is in the correct order? A. LAN, PAN, MAN, WAN B. LAN, MAN, PAN, WAN C. PAN, LAN, MAN, WAN D. PAN, MAN, LAN, WAN
C. PAN, LAN, MAN, WAN
27. With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking. A. DaaS B. IaaS C. PaaS D. SaaS
C. PaaS
28. _____________________ allows customers to both run existing applications and to develop and test new applications. A. DaaS B. IaaS C. PaaS D. SaaS
C. PaaS
17. A __________________________ expert system develops plans to achieve goals. A. Design B. Interpretation C. Planning D. Prediction
C. Planning
53. Which of the following is an argument FOR network neutrality? A. Handling the exploding demand for internet and wireless B. Impact on capital investments C. Possibilities of censorship D. Price discrimination
C. Possibilities of censorship
2. Which of the following is NOT a reason telecommunications companies want to transition away from the "plain old telephone system"? A. Cost B. Popularity C. Power concerns D. Stock prices
C. Power concerns
46. If you use airfarewatchdog.com to wait for the cheapest possible plane ticket to Australia for your summer vacation, this is an example of a __________ agent. A. Information B. Personal C. Predictive D. User
C. Predictive
47. _________ agents constantly observe and report on some item of interest. A. Information B. Personal C. Predictive D. User
C. Predictive
32. A major issue facing Cardlytics is ________. A. Cost B. Integration C. Privacy D. Training
C. Privacy
35.Moore's law has NOT had an impact on ______. A.Cost B.Performance C.Productivity D.Speed
C. Productivity
17. Google Drive is an example of a ___________ cloud. A. Hybrid B. Private C. Public D. Vertical
C. Public
20. ____________ clouds are the least expensive. A. Hybrid B. Private C. Public D. Vertical
C. Public
43.Which of the following is primary storage? A.Magnetic disk B.Magnetic tape C.RAM D.SSDs
C. RAM
7. PLASMA is used in the ________ industry to mimic the complex behavior of ________. A. Healthcare; dispatchers B. Healthcare; doctors C. Railroad; dispatchers D. Railroad; doctors
C. Railroad; dispatchers
9. Which of the following is NOT part of the Software Engineering Institute's definition of good software? A. Cost-effective B. Defect-free C. Readable D. Maintainable
C. Readable
15. ______________________ is NOT a benefit of virtualization. A. Lower fixed costs B. Lower variable costs C. Redundancy D. Scalability
C. Redundancy
38. When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________. A. Legacy IT systems B. Privacy C. Reliability D. Security
C. Reliability
12. Knowledge __________________________ occurs when knowledge is organized as rules or frames and stored electronically in a knowledge base. A. Acquisition B. Inferencing C. Representation D. Transfer
C. Representation
13. Which of the following is a decisional role? A. Analyzer B. Liaison C. Resource allocator D. Spokesperson
C. Resource allocator
36. Which of the following is a disadvantage of telecommuting for employers? A. Isolation B. Promotions C. Security D. Visibility
C. Security
40. Moving legacy systems to the cloud is difficult. Which of the following does NOT explain this phenomenon? A. Complexity B. Money spent C. Security D. User resistance
C. Security
36. ______________ analysis is the study of the impact that changes in one or more parts of a decision-making model have on other parts. A. Goal-seeking B. Market basket C. Sensitivity D. What-if
C. Sensitivity
11. Which of the following is NOT a characteristic of cloud computing? A. Grid and utility computing B. Pooling computing resources C. Server centralization on the internet D. Utilizing broad network access
C. Server centralization on the internet
13. NFC is an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area
C. Short-range
7. An advantage of a radio transmission system is ____________. A. Large coverage area B. Relatively inexpensive C. Signals pass through walls D. All of the above
C. Signals pass through walls
8. Which of the following is NOT part of the Software Engineering Institute's definition of good software? A. Cost-effective B. Reliable C. Strategic D. Usable
C. Strategic
6. _________________ software is an intermediary between computer hardware and _________________ software. A. Application; programming B. Application; systems C. Systems; application D. Systems; programming
C. Systems; application
1.Which of the following is FALSE? A.Hardware becomes obsolete more quickly than other organizational technologies. B.Knowing when to purchase hardware is one of the biggest difficulties. C.Technology is getting more advanced, so it tends to get more expensive as time progresses. D.You need to understand hardware because you may be making decisions about hardware purchases or upgrades.
C. Technology is getting more advanced, so it tends to get more expensive as time progresses.
38. Which of the following is FALSE? A. Email is often associated with information overload and stress. B. Email is the dominant form of communication in business and in education. C. The Atos case demonstrates that it is possible to cut out e-mail entirely. D. The fast-paced and collaboration-based business environment makes email less useful.
C. The Atos case demonstrates that it is possible to cut out e-mail entirely.
29. Which of the following is TRUE of the web? A. Quality assurance is managed by search engines like Google. B. The amount of information on the web quadruples every year. C. The fundamental rule about information on the web is "user beware". D. The Web is truly socialist since anyone can post information to it.
C. The fundamental rule about information on the web is "user beware".
39. Which of the following is NOT a limitation of bar codes? A. They can be easily ripped, soiled, or lost. B. They don't identify individual items. C. They don't identify the manufacturer. D. They require line of site.
C. They don't identify the manufacturer.
48. Auditing __________ the computer means inputs, outputs, and processing are checked. A. Around B. Into C. Through D. With
C. Through
11. _____________ is the most prevalent form of communications wiring. A. Coaxial cable B. Fiber optics C. Twisted-pair wire D. Wireless
C. Twisted-pair wire
50. _________ is a registry for searching web services. A. SOAP B. XML C. UDDI D. WSDL
C. UDDI
7. Business analytics answers the question ___________ A. What actions are needed? B. What happened? C. What is the best (or worst) that can happen? D. Where is the problem?
C. What is the best (or worst) that can happen?
6. BI answers the question _________________ A. What will happen if these trends continue? B. What will happen next? C. Where is the problem? D. Why is this happening?
C. Where is the problem?
2. Telecommunications around the world are shifting to ________ networks. A. cellular B. mobile C. Wi-Fi D. VoIP
C. Wi-Fi
19. ____________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna. A. MiFi B. Wi-Fi C. Wi-Fi Direct D. Super Wi-Fi
C. Wi-Fi Direct
16. Public clouds are ______________________. A. accessed through an extranet B. accessed through an intranet C. accessed through the internet D. stretched across different businesses
C. accessed through the internet
11.While the ______________ of hardware is constantly decreasing, the ______________ is constantly increasing. A.complexity; cost B.cost; complexity C.cost; performance D.performance; cost
C. cost; performance
35. Cloud computing delivers computing services ___________ on-premise computing. A. at the same time as B. can't compete with C. faster than D. slower than
C. faster than
22. Google's main business reason for installing fiber in select US cities is to _______. A. begin competing with the cable distribution giants B. bring the internet to rural areas C. generate more web traffic, which generates more ad revenue for them D. give people an option other than the telecommunications companies who control existing cable networks
C. generate more web traffic, which generates more ad revenue for them
13. The airport's self check-in computers are a(n) __________ threat. A. outside B. employee C. hardware D. software
C. hardware
11. RentRange is currently in the _______ industry but could move to the ________ industry. A. credit card; housing B. credit card; home appliance C. housing; credit card D. housing; home appliance
C. housing; credit card
26.A keyboard is an example of __________________. A.a communication device B.an output device C.human data-entry D.source-data automation
C. human data-entry
20. The web __________ the same thing as the internet. A. could be B. is C. is not D. I don't know
C. is not
51. The main problem with multifactor authentication is _____________. A. it's a single point of failure B. it's too hard to do C. it will invade our privacy D. there are no problems with multifactor authentication
C. it will invade our privacy
39. If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems, you are using a risk _________ strategy. A. acceptance B. analysis C. limitation D. transference
C. limitation
12. Cloud computing _____________________, which means a customer can access needed computing resources automatically. A. encompasses the characteristics of grid computing B. encompasses the characteristics of utility computing C. provides on-demand self-service D. utilizes broad network access
C. provides on-demand self-service
6. ujam is ____________ that uses ________ to produce sophisticated harmonies, bass lines, drum tracks, horn parts, etc. A. hardware; algorithms B. hardware; instinct C. software; algorithms D. software; instinct
C. software; algorithms
30. If you wanted to calculate your average in this class right now, you would use a __________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing
C. spreadsheet
2. The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________. A. sell social security numbers B. steal credit card numbers C. stop the release of the move The Interview D. threaten the US government
C. stop the release of the move The Interview
35. The Shodan case illustrates ___________. A. how vulnerable all devices are, even if they aren't connected to the internet B. strong passwords aren't necessary on home devices since most hackers don't care about such a small target C. that hackers and security researchers use the same sites to identify vulnerabilities D. the government is doing nothing to protect our privacy
C. that hackers and security researchers use the same sites to identify vulnerabilities
44. Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device. A. an extranet B. an intranet C. the internet D. the telephone
C. the internet
40. When you use Google Drive to work on a document with a classmate, this is considered _________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow
C. virtual collaboration
10. Enterprise computing was introduced in the _____________________. A. 1950s B. 1960s C. 1970s D. 1990s
D. 1990s
44. Reality mining is a type of _____________. A. Dashboard B. Database C. Data mining D. Data visualization technology
D. Data visualization technology
23. Small companies typically use _______ for their BI. A. Dashboards B. Data mining C. Data visualization D. Excel
D. Excel
45. Environmental Systems Research Institute is an international supplier of _________. A. AI B. DSS C. ERP D. GIS
D. GIS
5. Which of the following is NOT a software trend? A. Increasing complexity B. Increasing cost C. Increasing number of defects D. Increasing resistance to use
D. Increasing resistance to use
14. In which stage of the IDC do you examine the problem? A. Choice B. Design C. Implementation D. Intelligence
D. Intelligence
45.Which of the following is TRUE of secondary storage?A.It is volatile. B.It takes less time to retrieve data from it than from RAM. C.It is more expensive than primary storage. D.It can utilize a variety of media, each with its own technology.
D. It can utilize a variety of media, each with its own technology.
17. Which of the following is NOT a function of systems software? A. It controls and supports the computer system and its information-processing activities. B. It helps users and IT personnel program, test, and debug their own computer programs. C. It provides commonly used sets of instructions for all applications. D. It provides specific functionality to a user for word processing
D. It provides specific functionality to a user for word processing
42. Status access is the latest data available on _____________, often in real time. A. CRM B. CSF C. ERP D. KPI
D. KPI
8. Vertical searching is used by sites like ________ and is a threat to __________. A. Google; Facebook B. Google; Kayak C. Facebook; Google D. Kayak; Google
D. Kayak; Google
20.Whichof the following is NOT a microcomputer? A.Desktop personal computer B.PC C.Mac D.Mainframe
D. Mainframe
20. _______________ usually involve a large number of processors operating in parallel. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks
D. Neural networks
24. ___________ are used to research diseases like Alzheimer's, Parkinson's, and epilepsy. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks
D. Neural networks
25. _______________ are "trained" by being fed large amounts of data and rules about data relationships. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks
D. Neural networks
26. Machine learning systems often use _________ to learn from data. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks
D. Neural networks
3. _________________ was originally accused of the Sony Picture Entertainment hack on November 24, 2014; their involvement ____________ been proved. A. China; has B. China; has not C. North Korea; has D. North Korea; has not
D. North Korea; has not
14. "Best of breed" fits under which software issue? A. Defects B. Licensing C. Open source D. Open systems
D. Open systems
19. The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer. A. Microsoft; intended B. Microsoft; unintended C. OpenSSL; intended D. OpenSSL; unintended
D. OpenSSL; unintended
38. Genetic algorithms are most often utilized in the __________ department. A. Accounting B. Customer service C. Human resources D. Operations
D. Operations
16. A __________________________ expert system infers likely consequences of a given situation. A. Diagnosis B. Interpretation C. Planning D. Prediction
D. Prediction
23. Which of the following is a use of neural networks? A. Designing processes B. Identifying income categories C. Optimizing store displays D. Preventing money-laundering
D. Preventing money-laundering
32. The drawback of __________ for location-based tracking is that they require users to open a specific app to take a clear photo. A. GPS B. iBeacon C. NFC D. QR codes
D. QR codes
40. ________________ store information horizontally and vertically. A. Active RFID tags B. Bar codes C. Passive RFID tags D. QR codes
D. QR codes
42. Marks & Spencer implemented _______ to track its inventory more effectively. A. Bar codes B. Optical scanners C. QR codes D. RFID
D. RFID
32. Cloud computing can enable companies to shift from capital expenses to operational expenses. This characterizes which of the following benefits of cloud computing? A. Expanding the scope of business operations B. Making individuals more productive C. Mining insights from data D. Reducing costs
D. Reducing costs
18. A __________________________ expert system executes a plan to administer a prescribed remedy. A. Debugging B. Diagnosis C. Monitoring D. Repair
D. Repair
36. _______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan. A. Risk B. Risk analysis C. Risk management D. Risk mitigation
D. Risk mitigation
42.Which of the following is secondary storage? A.Cache memory B.ROM C.Registers D.SSDs
D. SSDs
29. With _______________, the user has no control of software beyond user configuration. A. IaaS B. OaaS C. PaaS D. SaaS
D. SaaS
30. With _________, the vendor manages the applications and data. A. IaaS B. OaaS C. PaaS D. SaaS
D. SaaS
23. You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________. A. Espionage B. Identity theft C. Information extortion D. Sabotage
D. Sabotage
7.__________________ storage stores data and programs for future use. A.Input B.Primary C.Output D.Secondary
D. Secondary
41. Least privilege is a concept associated with ___________________. A. Legacy IT systems B. Privacy C. Reliability D. Security
D. Security
36. If you want to evaluate the best product to market to your customers every month, you would use the __________ functional characteristic of a genetic algorithm. A. Crossover B. Expertise C. Mutation D. Selection
D. Selection
35. The ___________ model utilizes rented carts where patients receive a live consultation with a Miami Children's Hospital specialist working out of the Miami command center. A. Dynamic B. Extremely static C. Mobile D. Semistatic
D. Semistatic
10. Skybox is disrupting the space-based commercial imaging industry by focusing on ________. A. Communications B. Databases C. Hardware D. Software
D. Software
12. Piracy is an issue associated with ________. A. Open systems B. Open-source software C. Software defects D. Software licensing
D. Software Licensing
22. Phishing is an example of __________. A. Copyright infringement B. Espionage C. Sabotage D. Software attack
D. Software attack
48.__________ are the fastest form of secondary storage. A.Optical storage devices B.Magnetic disks C.Magnetic tapes D.Solid-state drives
D. Solid-state drives
41. According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed. A. the Heartbleed bug B. FireEye C. Shodan D. SpyEye
D. SpyEye
4. This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon. A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs
D. Stand-alone PCs
2. This stage in the evolution of the modern IT infrastructure was characterized by IT personnel being the only one with access. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe
D. Stand-alone mainframe
2.Decisions about hardware are NOT focused on __________. A.Appropriateness for the task B.Cost C.Speed D.Strategic value
D. Strategic Value
7. Hardware interacts directly with _______________ software. A. Application B. Documentation C. Programming D. Systems
D. Systems
28. ______________________ is the wireless transmission and receipt of data gathered from remote sensors. A. A mobile portal B. A voice portal C. The Internet of Things D. Telemetry
D. Telemetry
5._____________ manipulates the data and controls the tasks performed by the other components. A.AI B.EDI C.ERP D.The CPU
D. The CPU
42. Safe harbors address the concerns associated with __________. A. Criminal use of cloud computing B. Legacy IT systems C. Reliability of cloud computing services D. The regulatory and legal environment
D. The regulatory and legal environment
21. The Sochi Winter Games were similar to the Vancouver Winter Games in what respect? A. Both cities had a fairly modern basic IT infrastructure that was improved for the Games. B. The wireless networks of both were able to handle 4 Tbps per second. C. Wireless traffic outnumbered wired traffic by 4:1 for both. D. They both utilized the services of Avaya to get their cities ready for the Games.
D. They both utilized the services of Avaya to get their cities ready for the Games.
23.If ________ clients lose access to the internet, they can't do much. A.Fat B.Heavy C.Skinny D.Thin
D. Thin
22. In the past, BI was used to support __________. A. Corporate boards B. Low-level managers C. Middle-level managers D. Top managers
D. Top managers
13. You are the HR manager at ABC Corp. You are using an expert system to "score" candidates for the new sales manager job. The scores you receive are an example of knowledge __________. A. Acquisition B. Inferencing C. Representation D. Transfer
D. Transfer
41. ____________ is the short-, medium-, and long-term trends of metrics, which is projected using forecasting methods. A. CSF B. Drill-down C. KPI D. Trend analysis
D. Trend analysis
2. The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Google B. SkyNet C. Terminator D. Turing
D. Turing
1. Telecommunications companies want to get rid of their _____________ networks and replace them with ____________. A. Coaxial cable; fiber optics networks B. Coaxial cable; IP systems C. Twisted-pair copper wire; fiber optics networks D. Twisted-pair copper wire; IP systems
D. Twisted-pair copper wire; IP systems
17. Which of the following is a short-range wireless network? A. MiFi B. WiMAX C. WLAN D. UWB
D. UWB
25. _____________ means a mobile device can provide information and communication regardless of the user's location. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity
D. Ubiquity
16. __________________ problems are fuzzy and complex. A. Semistructured B. Structured C. Unistructured D. Unstructured
D. Unstructured
32. Fuzzy logic is best for handling _________ data and decisions. A. Partially structured B. Semistructured C. Structured D. Unstructured
D. Unstructured
49. The auto-fill functionality on your web browser is a(n) _________ agent. A. Buyer B. Information C. Predictive D. User
D. User
14. SaaS is a type of __________ computing. A. Grid B. Mainframe C. Mobile D. Utility
D. Utility
15. Which of the following is NOT an unintentional threat to information systems? A. Careless monitoring of environmental hazards B. Choosing a weak password C. Having an unlocked desk or filing cabinet after going home D. Viruses
D. Viruses
5. ____________ are networks that aren't contiguous. A. LAN B. MAN C. PAN D. WAN
D. WAN
7. The Internet is a ______________. A. LAN B. MAN C. PAN D. WAN
D. WAN
49. __________ is used to create the XML document that describes the tasks performed by the various web services. A. HTML B. SOAP C. UDDI D. WSDL
D. WSDL
45. _____________ is the act of locating WLANs while driving around a city. A. A rogue access point B. Eavesdropping C. RF jamming D. War driving
D. War driving
37. If you are trying to figure out the impact of a 2 versus a 4 percent inflation rate on your profit, that is a ______________ analysis. A. Goal-seeking B. Market basket C. Sensitivity D. What-if
D. What-if
35. Data mining helps explain _____________ happened. A. How B. What C. When D. Why it
D. Why it
15.Which of the following is an example of what a client does? A.Processing email B.Processing web sites C.Running networks D.Word processing
D. Word processing
26. A ___________ is a remote attack requiring user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack
D. phishing attack
53. The Target data breach started with a ____________. A. back door B. denial-of-service attack C. logic bomb D. phishing attack
D. phishing attack
10. RentRange uses _____________ to provide information about purchasing foreclosed and low-priced single-family homes and then renting them out. A. data visualization B. dashboards C. historical analytics D. predictive analytics
D. predictive analytics
1. AI is NOT concerned with _______________. A. building computers and robots with intelligence B. studying the thought processes of humans C. recreating the thought processes of humans via machines D. replacing workers with machines to reduce costs
D. replacing workers with machines to reduce costs
51. Facebook has busted the myth that _________. A. businesses can't use social networking sites B. privacy isn't that important C. security is paramount in any industry D. small screens inhibit big, flashy ads
D. small screens inhibit big, flashy ads
19. R&D tasks are ________________. A. operational and structured B. operational and unstructured C. strategic and structured D. strategic and unstructured
D. strategic and unstructured
48. Sentiment analysis extracts _________ information in source materials, which is particularly useful in __________. A. objective; business databases B. objective; social media C. subjective; business databases D. subjective; social media
D. subjective; social media
25. CPM is closely aligned with ___________ A. the development of one or a few related BI applications B. the development of infrastructure to support enterprise BI C. support for business analytics as a subcategory of BI D. support for organizational transformation
D. support for organizational transformation
29. The key fob you use to open your car before you get to it is an example of _______. A. a mobile portal B. a voice portal C. mobile commerce D. telemetry
D. telemetry
45. E-learning refers to learning supported by __________. A. an extranet B. an intranet C. the internet D. the web
D. the web
50. One of the reasons for Facebook shares to drop by 50 percent from the IPO was _____. A. the failure of Sponsored Stories B. the irritating nature of their ads C. their abuse of consumers' privacy D. their neglect of mobile advertising
D. their neglect of mobile advertising
33. The main purpose of Cardlytics is to ______________. A. collect personally identifying information B. securely share customer information between banks and merchants C. target potential new customers for retailers D. track and understand consumer buying behavior
D. track and understand consumer buying behavior
37. You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy. A. acceptance B. analysis C. limitation D. transference
D. transference
Metals and thick liquids can interfere with RFID signals, so Marks & Spencer _____. A. can only tag 50% of its merchandise B. can only tag 75% of its merchandise C. uses more powerful ID tags to capture the other 75% of its merchandise D. uses more powerful ID tags to ensure 100% of its merchandise are tagged
D. uses more powerful ID tags to ensure 100% of its merchandise are tagged
43. Telepresence is a version of ____________. A. email B. a portal C. unified communication D. videoconferencing
D. videoconferencing
42. When you exchange documents with your co-workers through organization-approved methods, this is considered __________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow
D. workflow