hello my name is
66. What is the systems development life cycle (SDLC)? a. A process to test new applications b. A disciplined approach to systems development c. Documentation an end user follows to operate a system d. Risk management of developing a new software e. Analysis of industry systems
A disciplined approach to systems development
What is the purpose of normalizing a database? Remove redundancy Set correct dependencies To be able to query a database accurately All of the above
All of the Above
82. How do you get Bitcoin? a. Offer goods and services in exchange for Bitcoin b. Purchase Bitcoin through an exchange c. Pay someone cash for Bitcoin d. Mine Bitcoin e. All of the above
All of the above
The primary benefit(s) of implementing ERP include _________. Improved access to quality data for operational decision making Elimination of inefficient or outdated systems Improvement of work processes Technology standardization All of the above
All of the above
_______ is the process of checking data for validity and completeness data collection data storage data processing data editing all of the above
All of the above
11) When you click on a link on a web page in your browser, the browser sends _______ to the web server. a) A cookie request b) An HTTP request c) An HTML request d) A DNS request
An HTTP Request
What are the two types of cryptography systems used in encryption today? Asymmetric, symmetric Accurate, accessibility Threat, solution Analog, digital Not listed above
Assymetric, symmetric
_______ involves making sure that information or data can only be accessed by individuals with authorized access. Integrity Availability Confidentiality Authenticity Non-repudiation
Availability
93) Which of these these colomns in the "ClassSchedule" table must have unique values? A. ClassID B. LocationID C. InstructorID D. ClassID and InstructorID
D
What technology correlates an IP address with a particular website? a) HTTP b) DNS c) TCP/IP d) HTML
DNS
62. What government privacy act regulates the use of private information by financial institutions? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA
GLBA
79. Which one of these restricts company's internal use of our information? a. GLBA b. FERPA c. COPPA d. HIPAA e. None
GLBA
74. What is outsourcing? a. Going to an outside organization to provide services b. Hiring new management c. Adopting d. Creating a new system for use e. Merging with another organization
Going to an outside org to provide services
59. What government privacy act protects your medical record confidentiality? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA
HIPPA
Tables in second normal form (2NF): Have all non-key fields depend on the whole primary key Eliminate the possibility of an insertion anomaly Have a composite key Never have a composite key
Have all non-key fields depend on the whole primary key
76. During which phase of the SDLC is the system made operational in a production environment? a. Requirements b. Design c. Development d. Implementation e. Maintenance
Implementation
What involves sensing conditions and predicting what conditions will require actions? Design Intelligence Choice Implementation Wisdom
Intelligence
EDI (Electronic Data Interchange) is typically used in: a) Interorganizational Systems b) B2C Commerce c) C2C Commerce d) Transaction Processing Systems
Interorganizational Systems
78. What is the term used to describe the trade-off between schedule, features and cost when trying to successfully complete the development of an information system? a. SDLC b. Iron Triangle c. Process modeling d. Gantt chart e. Database modeling
Iron Triangle
Which of the following is a metric that tracks progress in executing chosen strategies to attain organizational objectives and goals and consists of a direction, measure, target and timeframe? BI BA KPI CRISP-DM Modeling
KPI
91) ) In the sheet named 'GOOG', the formula in cell I2 (that can be copied to the cells below it) should be: A. IF(G2=C2,"Record High", "record Low") B. IF(G2=C2,"Record High", IF(H2=C2, "", "Record Low")) C. IF(G2=C2,"Record High", IF(H2=C2, "record Low","")) D. IF(G2=C2,"Record High","")
c
. Privacy of information is the __________ of the __________ collected by organizations about the individuals using their services. a. confidentiality, information b. collection, data c. protection, knowledge d. certification, wisdom e. privacy, information
confidentially, information
80. A process model should be __________. a. simple b. complicated c. descriptive d. logical e. short
descriptive
Valarie has decided to purchase her first home. Before she begins looking at houses, she has chosen to review her budget, and has decided on a very specific number that she is comfortable with for her monthly mortgage payment. What kind of analysis has Valarie done? "What-if" Analysis Goal seeking analysis Paired comparison Pros/cons Decision matrix
goal seeking analysis
When you shop online, what is an indication that the transaction is secure? http:// https:// ftp:// smtp POP3
https://
63. Which of the following is one's personal beliefs about right and wrong? a. feelings b. ethics c. morals d. core beliefs
morals
Technically speaking, a system that has been accessed illegally is victim of ______ Theft and fraud Unauthorized access Carless behavior Denial of service Automation tools
unauthorized access
. What types of viruses propagate through the internet with no user intervention? a. Virus hoaxes b. Zero-day viruses c. Stealth viruses d. Worms e. Trojan horses
worms
94) Which of these SQL queries will provide details of details of instructors from LocationID of 'L1' and instructors from LacationID of 'L3'? A. SELECT * FROM instructor WHERE Location ID= 'L1' AND LocationID='L3'; B. SELECT * FROM instructor WHERE Location ID= 'L1' OR LocationID='L3'; C. SELECT Location ID= 'L1' OR LocationID='L3' FROM Instructor; D. SELECT Location ID= 'L1' AND LocationID='L3' FROM Instructor;
B
What is a common tactic hackers use to allow themselves re-access to a system? Backdoor Trap door Keystroke capture Rootkit Access file
Backdoor
81. Which of the following is a false statement. a. Bitcoin transactions can be separated from the blockchain b. Bitcoin is a decentralized form of currency, meaning that it does not belong to any form of government and is not controlled by anyone c. software is used to send or receive BTC to and from a person's wallet. d. A BTC wallet has a unique encrypted set of numbers and letters which is linked only to one person
Bitcoin transactions can be separated from the blockchain
83. __________ is the process through which transactions on a cryptocurrency network are verified and stored. a. Blockchain b. mining c. validation of agreement d. all of the above
Block chain
86) In the sheet named 'GOOG', the formula in cell D2 (that can be copied to the cells below it) should be: A. (C2-D2)/D2 B. (B2-C2/C2 C. (C2-B2)/B2 D. ($C$2-$B$2)/$B$2
C
92) Based on the ERD of the database, which of these statements in true? A. Each instructor (identified by IntructorID) can teach at many locations B. Each instructor (identified by InstructorID) can teach many classes C. Each class (identified by ClassID) can be taught at many locations D. All of the above
C
64. A transaction that occurs via craigslist is an example of what? a. B2B b. B2C c. B2E d. C2C e. G2C
C2C
61. What government privacy act prevents websites from collecting personally identifiable information from children without parental consent? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA
COPPA
Which step in an Excel to Access conversion would deal with non-atomic data be? Determine the ERD Clean and prepare worksheet data in Excel Create tables using make table query in access Setup primary keys, data types, input masks, and validation rules and text Set up table relationships
Clean and prepare worksheet data in excel
What type of hidden collection approach tracks online browsing behavior? a. Cookies b. Clickstream data c. Key logger d. Spyware e. Trojan Horse
Clickstream data
What web 2.0 technology allows several individuals to contribute and share stored data and documents and includes controls to avoid two users from changing a document simultaneiously? Mashups Collaborative content Unified communications Really simple syndication Web conferencing
Collaborative content
69. What is the primary focus of the design phase of the SDLC? a. Desired level of performance b. Construction of the system c. Placing the system in production d. How the system will satisfy requirements
Construction of the system
_______ is a graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer. Data cube Conversion funnel Data table Onion graph Data visualization
Conversation Funnel
Small text files that store information that are deposited on your computer after you visit some websites are called what? a. Cookies b. Codes c. Applications d. Browsers e. Profiles
Cookies
_______ are used to determine how well each alternative meets a particular goal or requirement. Analysis Comparison Criteria Technique Tool
Criteria
73. __________ software is built from scratch using few commercially-obtained components. a. COTS b. Custom-built c. Developed d. Open source e. Hybrid
Custom-built
87) In the sheet named 'GOOG', the formula in cell E2 (that can be copied to the cells below it) should be: A. VLOOKUP(D2,Lookup!$C$5:$D$9,2,TRUE) B. VLOOKUP(GOOG!D2, Lookup!$C$5:$D$9,2,FALSE) C. VLOOKUP(D2,Lookup!$C$5:$D$9,1,FALSE) D. VLOOKUP(GOOG!E2,Lookup!$C$5:$D$9,2,TRUE)
D
88) ) In the sheet named 'GOOG', the formula in cell F2 (that can be copied to the cells below it) should be: A. MAX(C2:$C$60 B. MAX($C$3:C7) C. MAX(C3:C7) D MAX(C2:C6)
D
89) in the sheet named 'GOOG', the formula in cell G2 ( that can be copied to the cells below it) should be: A. MAX($C$2:C39) B. MAX($C$3:$C$39) C. MAX(C3:C39) D. MAX(C2:$C$39)
D
90) In the sheet named 'GOOG', the formula in cell H2 (that can be copied to the cells below it) should be: A. MIN($C$2:C39) B. MIN($C$3:$C$39) C. MIN(C3:C39) D. MIN(C2:$C$39)
D
The _________ operates on the TOR hidden network, so the minimum tool to access it is ________ browser. Dark web, TOR Deep Web, TOR Dark web, any Deep web, any All of the above
Dark web, TOR
Which of the following is a collection of data that contains numeric facts called measures, which are categorized by dimensions, such as time and geography? Onion graph Conversion funnel Data point Data cube Word cloud
Data cube
_______ is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision-making. BI Data modeling Data mining BA All of the above
Data mining
85. What Excel tool takes a range of different inputs that vary in a regular pattern and finds the corresponding outputs? a. Data Table b. Solver c. Scenario Manager d. Data validation e. Goal seek
Data table
The ________ uses a grid that lists all of the alternatives in the first column, and all of the criteria in the first row. Paired comparison Pros/cons analysis Sophisticated paired comparison Educated guess Decision matrix
Decision Matrix
What phase in the Decision Making Process is the most critical? Defining the problem Setting the requirements/goals Identifying the alternatives/criteria/tools Evalutating/selecting/verifying
Defining the problem
What kind of threat renders a system inoperative or limits its capability to operate? Denial of service Unauthorized access Theft and fraud Forceful Passive
Denial of service
68. What is a common result of E-Commerce when B2C introduced from brick-and-mortar? a. Exchanges b. Infomediaries c. Disintermediation d. Content Providers e. All of the above
Disintermediation
75. When planning a project, it is determined that the investment in the proposed project will not result in any profit. Which feasibility is this related to? a. Technical b. Economic c. Organizational d. Legal e. Ethical
Economic
By using the TOR browser on a computer in the United States, you are ______ Committing an illegal act Encrypting your browsing traffic and passing it through several nodes Encrypting your browsing traffic through a VPN connection Not encrypting your browsing traffic, but passing it through several nodes
Encrypting your browsing traffic through a vpn connection
Creating a virtual private network (VPN) requires: a) Encryption b) Web services c) Wi-fi d) Keyloggers
Encryption
60. A faculty member receives a phone call from the parent of a student. The parents inquires about the grade of the student on the last exam. If the instructor discloses any information, that instructor would violate what privacy act? a. CIPA b. COPPA c. FERPA d. HIPPA e. GLBA
FERPA
58. What are guidelines that suggest what the organization's practices should be with respect to the privacy of customers? a. Privacy policy b. Privacy guidelines c. Privacy seal d. Fair Information Practices e. Participation
Fair information practices
84. A currency declared by a government to be legal tenure, but is not backed by a physical commodity is called __________? a. Bitcoin b. Cryptocurrency c. Fiat Money d. All of the above
Fiat money
In order for you to enter the server room at your office you must have a key to the room, and then you must have a proper user name and password to access the server. All of the student files on the server are encrypted. What is this called? Layered security Overkill Defense in depth Organizational policy Information security
Layered security
Each Network Interface Card (NIC) has a unique hardware address called the: a) IP Address b) Web Address c) MAC Address d) Internet Address
MAC Address
71. Which phase of SDLC involves fixing any problems that are uncovered and may involve modifying the program to meet new ends? a. Planning b. Requirements c. Development d. Implementation e. Maintenance
Maintenance
Your IT department is adding a firewall to the network. What type of protection is the department adding? Data access Application access Physical access Network access User control
Network Access
A web merchant wants to ensure that people cannot deny that they entered into a transaction, so they start using digital signatures and encryption as part of their transaction processing. This is an example of what? a. Integrity b. Availability c. Confidentiality d. Authenticity e. Non-repudiation
Non repudiation
A company maintains two database tables: "Employee' and 'Department'. The 'Employee' table has details on each of the 527 employees in the company. As a result the 'Employee' table has 527 rows, one for each employee. The 'Department' table has details on each of the 12 departments in the company. As a result the 'Department' table has 12 rows, one for each department. Which one of the following is likely to be a foreign key in the 'Department' table? a) Department ID b) Employee ID c) Department ID and Employee ID d) None of the above
None of the Above
95) Referential integrity is being enforced for all of the relationships shown in the ERD diagram. We can delete: A. the record from the Instructor table corresponding to InstructorID 'T02' B. the record from the Location table corresponding to LocationID 'L1' C. the record from the ClassSchedule table corresponding to ClassID 'C003' D. none of the above
None of the above
When considering decision making techniques/tools, which tool requires you to evaluate each alternative against all other alternatives? Pros/cons analysis Paired comparisons Deep research Decision criteria Requirements
Paired comparisons
With the advent of extensive network capacity, smart phones, Internet of things and RFID, what is the term that some use to convey the ability of a few to control a society because of these merged technologies? a) Web 3.0 b) Biometrics c) Big Data d) Panopticon
Panopticon
Online content that is not visible via google search engine is ________. Inaccessible Part of the deep web Of little value Not on a hosted server All of the above
Part of the deep web
Your information systems group has decided to use Google Docs to work on your semester project. What type of architecture is your group using? VPN Cloud Computing Wireless Intranet Peer-to-peer
Peer to peer
70. If the integration plan is to implement a new system while the existing system is still running, what type of conversion plan would you be following? a. Direct Changeover b. Parallel Operation c. Phased Implementation d. Pilot Operation e. Use Case
Phased Implementation
You have received an email from your university IT department stressing that the IT department will never ask you for your username and password to your email account. What type of scheme is the university most likely trying to protect you from? Phising Smurfing Spoofing Break-Ins Security Holes
Phishing
67. Which phase of the SDLC begins the process? a. Requirements b. Planning c. Development d. Implementation e. Maintenance
Planning
What tools and techniques, rather than technologies, are available to help protect you online? a. Cookies managers b. Privacy policy and seals c. Cookies d. Spyware e. Surveillance
Privacy policy and seals
72. Auto makers spend a significant amount of time and money developing new automobiles. Often these auto makers create a working mock-up for display and testing. What methodology are these automakers using? a. Prototyping b. Modeling c. Maintenance d. Spiral Model e. Off the shelf
Prototyping
65. efile is an example of what business classification? a. Brick-and-Mortar b. Clicks-and-Mortar c. Pure E-Business d. E-Commerce e. Pure Play
Pure Play
What do you call conditions that any acceptable solution must provide? Goals Alternatives Requirements Desires Wants
Requirements
When verifying that the solution solves the problem at hand, you must be sure that the alternative meets all _______ and best meets the ________. Requirements, goals Requirements, needs Goals, wants Solutions, vision Problem, definition
Requirements, goals
What is software that allows hackers to have unfettered access to everything on the system, including adding, deleting, and copying files called? a. Spyware b. Sniffers c. Keystroke capture programs d. Backdoors e. Rootkits
Rootkits
You have been included on an IT steering committee for your University. The committee's priority is wireless access on your campus. The committee chair keeps discussing increasing enrollment numbers. What principle of architecture is the chair most likely alluding to? Ease of implementation Flexibility Control Scalability Security
Scalability
Which of these Excel tools would you use (just once) to find values of multiple inputs that provide a given single output value? a) Goal seek b) Scenario manager c) Solver d) Formula auditing
Scenario Manager
What term is used to refer to someone (or something) pretending to be someone else (or another computer)? Phising Spoofing Smurfing Porting Break-In
Spoofing
Order fulfillment at a warehouse using robots is a type of: a) Semi-structured decision making b) Structured decision making c) Unstructured decision making d) Non-programmed decision making
Structured Decision Making
Transaction Processing Systems (TPS) can make decisions using predetermined rules and processes. This is an example of a(n) _______ decision of a(n) _______ control. Unstructured, operational Structured, operational Semi-structured, managerial Unstructured, managerial Structured, strategic
Structured operational
What did Arpanet grant develop? a) HTTP b) DNS c) TCP/IP d) HTML
TCP/IP
Every packet of data on the internet contains within it _____ the source machine. The web address of The HTML content from The IP address from A cookie form
The IP Address from
77. What documentation or modeling technique is used to convey what the system is to do? a. DFD b. ERD c. CASE d. Database Modeling e. Both b and d
both ERD and DATAbase modeling
If a virus is embedded in a legitimate file, they are often called a(n)__________. Worm Trojan horse Hack Theft Active content
Trojan horse
What type of decisions are novel and do not have agreed upon procedures for making the decisions? Unstructured Structured Semi-structured Dependent Independent
Unstructured
A(n) ______ is a data inconsistency that results from data redundancy Update anomaly Insertion anomaly Deletion anomaly Any of the above
Update anomaly
What technology, other than computer communications, is necessary for cloud computing? a). SSL/TLS b). DNS c). TCP/IP d). Virtualization
Virtualization
innovators are working on Web 3.0. What type of new technology is expected from Web 3.0? Virtualization Instant gratification Signatures Procedures Semantics
Virtualizationq