BTE 210 FINAL

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

12. An example of a(n) ________________ protocol is SMTP. A. Application B. Internet C. Network interface D. Transport

A. Application

24. __________ is an identity theft technique. A. Dumpster diving B. Espionage C. Sabotage D. Vandalism

A. Dumpster diving

36.A byte is ______ bits. A.2 B.8 C.16 D.32

B. 8

22. Microsoft's "Clippy" was an example of __________. A. a GUI B. a social interface C. application software D. operating system software

B. a social interface

23. IaaS, PaaS, and SaaS shift IT from a(n) _________________ expense, which means IT is ____________ cost. A. capital to an operating; fixed rather than variable B. capital to an operating; variable rather than fixed C. operating to a capital; fixed rather than variable D. operating to a capital; variable rather than fixed

B. capital to an operating; variable rather than fixed

43. A firewall is a _______ control. A. access B. communication C. physical D. virtual

B. communication

36. Scalability benefits organizations by ______________. A. creating a competitive advantage B. improving organizational flexibility C. positively impacting employees D. saving money

B. improving organizational flexibility

3. The Turing test involves a human and computer ______________. A. answering the phone B. interviewing C. playing Jeopardy! D. playing chess

B. interviewing

32. You want to convince a potential customer that your products are better than your top competitor. You want to show pictures comparing the products, pie charts illustrating your market share compared to theirs, etc. To do this, you would use a __________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing

B. presentation

48. An evil twin attack is a type of ___________. A. eavesdropping B. rogue access point C. radio-frequency jamming D. war driving

B. rogue access point

45. A collection of web services constitutes a ___________. A. self-service architecture B. service-oriented architecture C. service-level package D. Software-as-a-Service package

B. service-oriented architecture

27. ___________ speech-recognition software interprets human speech one word at a time. A. Continuous B. Conversational C. Discrete D. Interpretation

C. Discrete

31. Which of the following is an example of a metasearch engine? A. Boardreader B. CrunchBase C. Dogpile D. Google

C. Dogpile

8. The most popular BI tool is _______________. A. CRM B. ERP C. Excel D. Word

C. Excel

26. Which of the following is NOT a KPI? A. Operational costs B. Overhead C. Product quality D. ROI

C. Product quality

10. _____________ is a disadvantage of twisted-pair wire. A. Difficult to work with B. Relatively expensive and inflexible C. Subject to interference D. All of the above are disadvantages

C. Subject to interference

6. A disadvantage of a microwave transmission system is ____________. A. Creates electrical interference problems B. Signals experience propagation delay C. Susceptible to environmental interference D. none of the above

C. Susceptible to environmental interference

9. Wireless is a(n) inherently _________ network. A. trusted B. neutral C. untrusted D. useful

C. untrusted

12. The biggest challenge for Skybox is ________. A. collecting data B. competition C. expenses D. government regulation

D. government regulation

47. Which of the following is a DRAWBACK of e-learning? A. cost B. delivery C. flexibility D. interaction

D. interaction

48. Which of the following is a BENEFIT of e-learning? A. computer literacy B. integrity C. interaction D. learning time

D. learning time

30. ___________ uses fuzzy logic. A. Amazon B. Facebook C. Google D. Twitter

Google

27. Airline predictions are off by an average of _______. A. 7 minutes B. 57 minutes C. 2 hours D. 4 hours

A. 7 minutes

27._____________________ is the most common input device for text and numerical data. A.A keyboard B.A touch screen C.A web camera D.Voice-recognition

A. A keyboard

32.The __________________ performs the mathematic calculations and makes logical comparisons. A.ALU B.Control unit C.Primary storage D.Registers

A. ALU

3. _______________ is the only major carrier in the US that offers seamless offloading to Wi-Fi networks. A. AT&T B. Spring C. T-Mobile D. Verizon

A. AT&T

12. Which of the following is NOT one of the most dangerous employees to information security? A. Accountants B. HR employees C. Janitors D. MIS employees

A. Accountants

52. Which of the following is NOT a positive of MOOCs for students? A. Accredited degree options B. Cost C. Self-pacing D. Social interaction

A. Accredited degree options

11. You are a doctor at a successful practice in the US. You are contacted by WebMD.com to provide your expertise on your successful new cancer identification technique. This is considered knowledge _______. A. Acquisition B. Inferencing C. Representation D. Transfer

A. Acquisition

41. The advantage of ________________ is they can be read over greater distances. A. Active RFID tags B. Passive RFID tags C. QR codes D. WSNs

A. Active RFID tags

18. ________ is a type of systems software. A. An operating system B. Personal information management C. Speech-recognition software D. Word processing

A. An operating system

13. The ____________ protocol enables client application programs to access the other layers. A. Application B. Internet C. Network interface D. Transport

A. Application

9. Blackstone Group initially focused on the most depressed housing markets in ________. A. Atlanta, GA B. Detroit, MI C. Las Vegas, NV D. Seattle, WA

A. Atlanta, GA

17.Which of the following is NOT an example of a supercomputer or mainframe application? A.Augmented reality technologies B.Corporate payroll programs C.Student grade calculation and reporting D.Web site transaction processing systems

A. Augmented reality technologies

20. The International Olympic Committee selected ___________ to build and manage the Wi-Fi network for the 2014 Winter Games A. Avaya B. Cisco C. Netgear D. Ooma

A. Avaya

12.The ____________ phenomenon addresses the use of personal devices at work. A.BYOD B.CIC C.RFID D.SFA

A. BYOD

23. Which of the following is NOT a value-adding attribute of mobile computing? A. Bandwidth improvement B. Instant connectivity C. Localization D. Ubiquity

A. Bandwidth improvement

15. An expert system's ______________________ is like a database. A. Blackboard B. Explanation subsystem C. Knowledge base D. Inference engine

A. Blackboard

42. Intelligent agents are also called _________. A. Bots B. Expert systems C. Smart systems D. Spammers

A. Bots

26. ____________ refers to the fact that when users carry an open mobile device, they can be reached instantly, even across great distances. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

A. Broad reach

16. Which of the following is TRUE of open-source software? A. Bugs tend to be fixed quickly. B. Businesses may have to depend on volunteers or contractors for upkeep. C. It doesn't require a license. D. It is easy to use.

A. Bugs tend to be fixed quickly.

5. ___________ is a subset of BI according to Thomas Davenport. A. Business analytics B. OLAP C. Querying D. Reporting

A. Business analytics

44. A shopping bot is also called a _____________ agent. A. Buyer B. Personal C. Predictive D. Seller

A. Buyer

18. ________________ is access to the internet through your TV connection. A. Cable modem B. Dial-up C. DSL D. FTTH

A. Cable modem

6. Which of the following is NOT a lesson learned from the Sony Picture Entertainment hack on November 24, 2014? A. China is the leading hacking group that encourages similar behavior from other countries. B. It appears that it is impossible to secure the Internet. C. It is difficult, if not impossible, for organization to provide perfect security for their data. D. There is a growing danger that countries are engaging in economic cyberwarfare among themselves.

A. China is the leading hacking group that encourages similar behavior from other countries.

1. Which of the following is the correct order of the evolution of the modern IT infrastructure, from latest to earliest? A. Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes B. Cloud and mobile computing, stand-alone PCs, enterprise computing, LANs (client/server computing), mainframe and dumb terminals, stand-alone mainframes C. Stand-alone mainframes, mainframe and dumb terminal, LANs (client/server computing), enterprise computing, stand-alone PCs, cloud and mobile computing D. Stand-alone mainframes, mainframe and dumb terminal, stand-alone PCs, LANs (client/server computing), enterprise computing, cloud and mobile computin

A. Cloud and mobile computing, enterprise computing, LANs (client/server computing), stand-alone PCs, mainframe and dumb terminals, stand-alone mainframes

7. This stage in the evolution of the modern IT infrastructure was characterized by sharing pools of resources over a network, usually the internet. A. Cloud computing B. Enterprise computing C. LANs (client/server computing) D. Mainframe and dumb terminals

A. Cloud computing

47. If you have an empty building you can move into if your primary location is destroyed, you've implemented a _________ site. A. Cold B. Hot C. Neutral D. Warm

A. Cold

26. _______________________ speech-recognition software recognizes and interprets conversational streams. A. Continuous B. Conversational C. Discrete D. Interpretation

A. Continuous

50. Security must be balanced with _________ for people to use systems. A. Convenience B. Cost C. Time D. Trust

A. Convenience

3. Which of the following is NOT a reason it is so difficult to transition away from a twisted-copper wire network for telecommunications? A. Cost B. FCC guarantees C. Power requirements D. Safety

A. Cost

49.Which of the following is NOT an advantage of solid state drives over hard drives? A.Cost B.Heat production C.Power use D.Speed

A. Cost

43. Anonymity on the internet enhances the problems associated with _______. A. Criminal use of cloud computing B. Legacy IT systems C. Reliability of cloud computing services D. The regulatory and legal environment

A. Criminal use of cloud computing

37. If a genetic algorithm recommends spending more on marketing and calling customers directly to improve product sales, you would be using the __________ functional characteristic of a genetic algorithm. A. Crossover B. Expertise C. Mutation D. Selection

A. Crossover

29. Alaska Airlines used ______________ to solve their flight delay problems. A. Crowdsourcing B. Insourcing C. Nearshore outsourcing D. Offshore outsourcing

A. Crowdsourcing

27. Which of the following is NOT an example of a machine learning system? A. Customer detection B. Face recognition C. Fraud detection D. Spam recognition

A. Customer detection

20. Which of the following is NOT a BI tool? A. Data dictionary B. Data mining C. Data visualization D. Dashboards

A. Data dictionary

3. Which of the following is NOT a benefit of PLOT for ConocoPhillips? A. Data variability B. Improved revenue C. Increased production D. Reduced greenhouse emissions

A. Data variability

29. ____________________ extend(s) word processing software to allow production of finished, camera-ready documents, which may contain photos, diagrams, and other images. A. Desktop publishing B. Graphics C. Personal finance D. Web authoring

A. Desktop publishing

24. Data marts are used to __________________. A. Develop few, related BI applications B. Develop infrastructure to support enterprisewide BI C. Support business analytics as a subcategory of BI D. Support organizational transformation

A. Develop few, related BI applications

5. Which of the following is a characteristic of natural intelligence? A. Difficult and expensive to duplicate and disseminate knowledge B. Limited use of sensory experiences C. Low creativity D. Reasoning is only good in narrow, focused, and stable domains

A. Difficult and expensive to duplicate and disseminate knowledge

12. Which of the following is an informational role? A. Disseminator B. Disturbance handler C. Entrepreneur D. Figurehead

A. Disseminator

33. Which of the following is NOT a telemedicine model used by the Miami Children's Hospital? A. Dynamic B. Extremely static C. Mobile D. Semistatic

A. Dynamic

46. Which of the following is NOT a web service protocol? A. EDI B. SOAP C. XML D. UDDI

A. EDI

43. ____________ is NOT a benefit of RFID for Marks & Spencer. A. Efficient production B. Inventory accuracy C. Inventory turnover D. Out-of-stock products

A. Efficient production

6. Systems like ERP, CRM, and SCM were introduced in the _________ stage in the evolution of the modern IT infrastructure. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe

A. Enterprise computing

9. ___________ are the most widely applied and commercially successful intelligent systems. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks

A. Expert systems

17. VPN is a type of ________________. A. Extranet B. Internet C. Intranet D. None of the above

A. Extranet

24.If ________ clients lose access to the internet, they are still useable. A.Fat B.Heavy C.Skinny D.Thin

A. Fat

51. Which of the following is a positive of MOOCs for universities? A. Filtering of student questions B. Handling diversity C. Pass rate D. Revenues

A. Filtering of student questions

9. ______________ satellites are the most expensive to build and launch. A. GEO B. LEO C. MEO D. SEO

A. GEO

38. __________ analysis focuses on the outputs rather than the inputs. A. Goal-seeking B. Sensitivity C. Solution D. What-if

A. Goal-seeking

39. Suppose you want to ensure your Northwest Division generates at least $2 million in revenue. You then use _____________ analysis to determine how much advertising dollars and how many salesmen need to be hired. A. Goal-seeking B. Sensitivity C. Solution D. What-if

A. Goal-seeking

13. _____________________ computing makes scalability easier. A. Grid B. Mainframe C. Mobile D. Utility

A. Grid

37. The Internet of Things is also called the _______. A. Industrial Everywhere Internet B. Internet of Anything C. Internet of Everything D. M2M Communication

A. Industrial Everywhere Internet

43. ________ agents search for information and display it to users. A. Information B. Monitoring and surveillance C. Personal D. User

A. Information

45. Amazon uses a(n) ____________ agent for its recommendation system. A. Information B. Monitoring and surveillance C. Personal D. User

A. Information

8.________________ technologies accept data and instructions and convert them to a form that the computer can understand. A.Input B.Primary C.Output D.Secondary

A. Input

23. Which of the following is FALSE of Google Fiber? A. It brings high-speed broadband to low-income "fiberhoods" for free. B. It has been rejected by some cities who prefer to install fiber themselves. C. It may create a new era for privately built broadband. D. It provides ultrafast speed and storage space for DVR recording.

A. It brings high-speed broadband to low-income "fiberhoods" for free.

18. Wi-Fi is a ______________. A. LAN B. MAN C. PAN D. WAN

A. LAN

6. Your school's main campus network is a ___________. A. LAN B. MAN C. PAN D. WAN

A. LAN

37. If your IT department doesn't want to move to cloud computing because they don't want to learn how to manage and maintain a new system, this reflects the following cloud computing concern: A. Legacy IT systems B. Privacy C. Reliability D. Security

A. Legacy IT systems

46.Hard drives are a type of _____________ that are ______________ access. A.Magnetic disks; direct B.Magnetic disks; sequential C.Magnetic tapes; direct D.Magnetic tapes; sequential

A. Magnetic disks; direct

41.ROM is ____________ storage that is _______________. A.Primary; non-volatile B.Primary; volatile C.Secondary; non-volatile D.Secondary; volatile

A. Primary; non-volatile

17. The yearly employee evaluation is a(n) __________________ problem. A. Semistructured B. Structured C. Unistructured D. Unstructured

A. Semistructured

30. Apple's iBeacon uses ___________ wireless network technology to provide location- aware, contextual information to users. A. Short-range B. Local-area C. Medium-range D. Wide-area

A. Short-range

40. You decide to use the password "1234" on your computer because you figure nobody cares enough about your information to steal it. This is a risk __________ strategy. A. acceptance B. analysis C. limitation D. transference

A. acceptance

2. ConocoPhillips addressed employee resistance to using PLOT by ____________. A. centralizing the monitoring process B. decentralizing the monitoring process C. hiring better employees D. firing those people

A. centralizing the monitoring process

13.Portable computers and advanced ___________ have enabled employees to work from home or from anywhere. A.communication technologies B.input technologies C.output technologies D.primary storage devices

A. communication technologies

30. Search engines use indexes created by web _________ to provide fast searches. A. crawlers B. indexers C. searchers D. users

A. crawlers

49. Using a hotspotter is useful for _____________. A. creating a rogue access point B. eavesdropping C. radio-frequency jamming D. war driving

A. creating a rogue access point

41. The Doritos' customer-created Super Bowl commercials are an example of _________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow

A. crowdsourcing

44. Telepresence requires _________ and costs have ________ in the last 10 years. A. dedicated rooms; decreased B. dedicated rooms; increased C. tele- and video-conferencing capabilities; decreased D. tele- and video-conferencing capabilities; increased

A. dedicated rooms; decreased

5. Modern smartphones exhibit a process called __________, which means the functions of many physical devices are included in one other physical device. A. dematerialization B. materialization C. multi-tasking D. tasking

A. dematerialization

31. The goal of CAPTCHA is to ___________. A. ensure you aren't alien software B. hack into secure networks C. protect networks against hackers D. remove alien software from your computer

A. ensure you aren't alien software

40. Intelligent agents often use _________ behind the scenes. A. expert systems and fuzzy logic B. expert systems and genetic algorithms C. fuzzy logic and neural networks D. fuzzy logic and genetic algorithms

A. expert systems and fuzzy logic

22. Vertical clouds are similar to ___________. A. extranets B. intranets C. internets D. suppliernets

A. extranets

54. By hiring FireEye to improve their security, Target adopted a risk _________ strategy; This strategy was ___________. A. limitation; a failure B. limitation; successful C. transference; a failure D. transference; successful

A. limitation; a failure

33. You use Quicken to track your investments. This is a type of ________ personal application software. A. personal finance B. personal information management C. presentation D. spreadsheet

A. personal finance

31. If you want to ensure you get everything done by the end of the semester, you would use a ___________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing

A. personal information management

16.Which of the following is an example of what a server does? A.Processing email B.Running spreadsheets C.Tracking user activity D.Word processing

A. processing email

From smallest to largest, which of the following is in the correct order? A.KB, MB, GB, TB, PB, EB, ZB B.KB, MB, TB, GB, PB, EB, ZB C.MB, KB, GB, TB, PB, EB, ZB D.MB, KB, TB, GB, PB, EB, ZB

A.KB, MB, GB, TB, PB, EB, ZB

50.CDs are an example of _________.A.Optical storage devicesB.Magnetic disksC.Magnetic tapesD.Solid-state drives

A.Optical storage devices

10. On average, professional programmers make around _________ errors in every 1000 lines of code they write. A. 10 B. 100 C. 250 D. 500

B. 100

37. A kilobyte is _____________ bytes. A.1000 B.1024 C.1,000,000 D.1,000,024

B. 1024

3. The first software applications for computers in business were developed in the early _____. A. 1940s B. 1950s C. 1960s D. 1970s

B. 1950s

20. __________________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. A. Application software B. A GUI C. Open-source software D. Operating systems software

B. A GUI

9. Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today. A. AI B. BYOD C. ERP D. RFID

B. BYOD

31. Cardlytics services the ________ industry. A. Automobile B. Banking C. Healthcare D. Housing

B. Banking

30. Which of the following is NOT an example of alien software? A. Adware B. Blockware C. Spamware D. Spyware

B. Blockware

43. The color ___________ in the Management Cockpit represents performance of internal processes and employees. A. Black B. Blue C. Red D. White

B. Blue

4. _________________ manages the internet connections for North Korea and could stop hacking attempts on the US. A. Australia B. China C. India D. Russia

B. China

5. Which country is currently in a dispute with the US over bilateral hacking? A. Australia B. China C. India D. United Kingdom

B. China

27. Lycos is an example of a________________ portal. A. Affinity B. Commercial C. Corporate D. Industrywide

B. Commercial

24. The internet in _____________ is among the most tightly controlled in the world. A. China B. Cuba C. Russia D. Vietnam

B. Cuba

15. Validation of the model occurs in the _______ phase of the IDC. A. Choice B. Design C. Implementation D. Intelligence

B. Design

34. Which of the following is a use of genetic algorithms? A. Identifying income categories B. Designing processes C. Financial analysis D. Preventing money-laundering

B. Designing processes

40. _____________________ is the ability to go to details, at several levels; it can be done by a series of menus or by clicking on a drillable portion of the screen. A. CSF B. Drill down C. KPI D. Trend analysis

B. Drill down

37. To increase employee productivity, Atos banned __________. A. Breaks B. Email C. Internet use D. Online social networking

B. Email

18. OpenSSL is __________ software. A. Banking B. Encryption C. Hacking D. Free

B. Encryption

4. Which of the following is TRUE of software? A. Complexity has decreased B. Errors are more common C. It takes less time to program D. Price has decreased

B. Errors are more common

36. The ___________ model utilizes kiosks to open new market opportunities for the Miami Children's Hospital in offsite locations like malls and shopping centers. A. Dynamic B. Extremely static C. Mobile D. Semistatic

B. Extremely static

22.You purchased a laptop and installed Word, Excel, Outlook, and other useful applications on it; this makes your laptop a _______________-clientsystem. A.Cloud B.Fat C.Thin D.Open

B. Fat

52. __________ is a computer security firm that sells malware detection tools to companies like Target. A. Heartbleed B. FireEye C. Shodan D. SpyEye

B. FireEye

31. _______________ is best for handling "gray" decision-making problems. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

B. Fuzzy logic

46. In the lost hiker example, which of the following was NOT used to improve the ArcGIS suggestions? A. Facebook B. Google C. Park ranger knowledge D. Twitter

B. Google

1. Which hacker group successfully attacked Sony Picture Entertainment on November 24, 2014? A. Anonymous B. Guardians of Peace C. Hackweiser D. Legion of Doom

B. Guardians of Peace

4. ____________ is NOT categorized as BI. A. Applications B. Hardware C. Processes D. Technologies

B. Hardware

19. _________ is NOT a desktop operating system. A. Google Chrome B. IBM Cloud C. Linux D. Microsoft Windows

B. IBM Cloud

54. Network neutrality means _____________________. A. Countries are not allowed to attack each other on the internet. B. ISPS must allow customers equal access to content and applications, regardless of the source or nature of the content. C. Networks don't work against each other. D. All of the above

B. ISPS must allow customers equal access to content and applications, regardless of the source or nature of the content.

24. _____________________________ is a service that delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model. A. DaaS B. IaaS C. PaaS D. SaaS

B. IaaS

25. With ____________, the customer manages the operating system. A. DaaS B. IaaS C. PaaS D. SaaS

B. IaaS

26. With ____________, the customer manages applications, data, and the operating system while the vendor manages the servers, virtualization, storage, and networking. A. DaaS B. IaaS C. PaaS D. SaaS

B. IaaS

13. __________, the same operating system with compatible software is installed on all computers that interact within an organization. A. In an ideal world B. In an open system C. With open-source software D. With proper software licensing

B. In an open system

32. SCADA attacks typically occur on ___________. A. Hacker networks B. Industrial control systems C. Personal computers D. Government networks

B. Industrial control systems

20. Google created a code fix for the Heartbleed bug. Which of the following is a TRUE statement? A. Home internet routers should be largely safe from this bug since they don't exchange enough sensitive data to be a target. B. Industrial control systems are highly vulnerable since they are updated infrequently. C. Organizations simply have to install the fix. D. Organizations need to install the fix and just create new private key-public key pairs.

B. Industrial control systems are highly vulnerable since they are updated infrequently.

16. The ________________ is a network of networks. A. Extranet B. Internet C. Intranet D. None of the above

B. Internet

14. An expert system's ______________________ is composed of facts and rules. A. Explanation subsystem B. Knowledge base C. Inference engine D. User interface

B. Knowledge base

19. ______________________ is NOT a benefit of an expert system. A. Knowledge accessibility B. Liability C. Productivity D. Reliability

B. Liability

47.___________ is the cheapest form of memory. A.Cache B.Magnetic disk C.Magnetic tape D.RAM

B. Magnetic disk

18.___________ have the highest performance and greatest reliability A.Laptop computers B.Mainframes C.Microcomputers D.Tablets

B. Mainframes

10. Which of the following is FALSE? A. It is easier to be a hacker nowadays. B. Mainframes make it easy to communicate freely and seamlessly with everyone. C. Management doesn't always support security efforts. D. Thumb drives make it easy to steal huge amounts of sensitive information.

B. Mainframes make it easy to communicate freely and seamlessly with everyone.

15. Hotspots are an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area

B. Medium-range

16. Which of the following is a medium-range wireless network? A. Bluetooth B. MiFi C. NFC D. UWB

B. MiFi

27. ______________________ refers to the real-time connection between a mobile device and other computing environments. A. Location-based commerce B. Mobile computing C. Mobile commerce D. Telemetry

B. Mobile computing

25.Which of the following is an example of an output technology? A.Keyboard B.Monitor C.Mouse D.Trackball

B. Monitor

15. ____________________ are/is available at no cost to developers or users. A. Hardware B. Open-source software C. Open systems D. Proprietary software

B. Open-source software

18. ___________________ control is executing specific tasks efficiently and effectively. A. Management B. Operational C. Strategic D. Tactical

B. Operational

28. _____________________ allow(s) users to create and maintain calendars, appointments, to-do lists, and business contacts. A. Data management B. Personal information management C. Presentation D. Spreadsheets

B. Personal information management

28. Which of the following is NOT a reason for flight delays? A. Passengers B. Pilots C. Weather D. Wind

B. Pilots

31.___________ use computer-directed pens for creating high-quality images, blueprints, schematics, drawing of new products, etc. A.Monitors B.Plotters C.Pocket projectors D.Printers

B. Plotters

6.____________________ storage temporarily stores data and program instructions during processing. A.Input B.Primary C.Output D.Secondary

B. Primary

39. Unlike private clouds, public clouds have a problem with ________. A. Legacy IT systems B. Privacy C. Reliability D. Security

B. Privacy

18. ________________ clouds are proprietary data centers that integrate servers, storage, networks, data, and applications. A. Hybrid B. Private C. Public D. Vertical

B. Private

19. A ________________ cloud is also called a corporate cloud. A. Hybrid B. Private C. Public D. Vertical

B. Private

21. ______________ clouds are the most secure because they can be placed behind an organization's firewall. A. Hybrid B. Private C. Public D. Vertical

B. Private

34. Which of the following is a benefit of cloud computing? A. Privacy B. Productivity C. Reliability D. Security

B. Productivity

35. Which of the following is a benefit of telecommuting for employees? A. Increased productivity B. Reduced stress C. Retaining skills D. All of the above

B. Reduced stress

33.Which of the following types of primary storage is part of the CPU? A.Cache memory B.RAM C.Registers D.ROM

B. Registers

48. __________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML. A. HTML B. SOAP C. UDDI D. WSDL

B. SOAP

26. To access the internet ILLEGALLY, Cuban citizens can _________. A. Pay $5 per hour B. Share user accounts C. Show their national ID D. Sign agreements

B. Share user accounts

4. Which of the following is NOT a major advantage of wireless devices to users? A. They are small enough to easily carry or wear. B. They can be used to copy and pass on confidential information. C. They can communicate wirelessly with the Internet and other devices. D. They have sufficient computing power to perform productive tasks.

B. They can be used to copy and pass on confidential information.

21. Icons on your desktop are an example of _____________________. A. application software B. a GUI C. input hardware D. operating system software

B. a GUI

33. Shodan's primary purpose is ___________. A. a hacker website B. a service that searches the internet for devices connected to the internet C. a website that shows which devices are vulnerable to hackers D. to help users search for other people who use similar devices

B. a service that searches the internet for devices connected to the internet

24. ________________________________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. A. A GUI B. A software suite C. Personal application software D. Speech-recognition software

B. a software suite

25. Cuban citizens primarily have access to _____________. A. an extranet B. an intranet C. the internet D. nothing internet-related

B. an intranet

10. Expert systems ______ replace human experts by applying expertise in a _____ domain. A. can; general B. can; specific C. cannot; general D. cannot; specific

B. can; specific

42. The purpose of SpyEye is to _____________. A. catch hackers in the act of hacking B. collect personal and financial information C. facilitate SCADA attacks by seeing which systems are vulnerable D. watch what you do on your computer

B. collect personal and financial information

22. Neural networks are best used for analyzing ________ data. A. complex, complete B. complex, incomplete C. simple, complete D. simple, incomplete

B. complex, incomplete

46. Which of the following is a DRAWBACK of e-learning? A. content B. computer literacy C. delivery D. flexibility

B. computer literacy

30. GE's goal for Flight Quest is to ____________. A. alter the practices and official handbooks of air traffic controllers B. create smart assistants for pilots C. own the data created by airlines D. replace pilot decisions

B. create smart assistants for pilots

1. ConocoPhillips uses ________ to monitor _________ data. A. dashboards; historical B. dashboards; real-time C. data warehouses; historical D. data warehouses; real-time

B. dashboards; real-time

1. Hardware costs have been _______________ over time and software costs have been _______________ over time. A. decreasing; decreasing B. decreasing; increasing C. increasing; decreasing D. increasing; increasing

B. decreasing; increasing

27. A ___________ is a remote attack needing no user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack

B. denial-of-service attack

39. Atos' Zero Email initiative banned __________ as a form of communication _________. A. email; externally B. email; internally C. social networking; externally D. social networking; internally

B. email; internally

14. Weak passwords are a(n) ___________ threat. A. outside B. employee C. hardware D. software

B. employee

46. _________ is one common example of SSL. A. http B. https C. www D. wwws

B. https

15. BitTorrent is an example of P2P that ____________________. A. accesses unused CPU power among network computers B. is open-source, free, P2P file sharing C. is real-time, person-to-person collaboration D. does all of the above

B. is open-source, free, P2P file sharing

2. Hardware has become _______ complex over time; software has become _________ complex over time. A. less; less B. less; more C. more; less D. more; more

B. less; more

52. Facebook has discovered __________ are the most effective way of reaching consumers. A. banner ads B. native ads C. pop-under ads D. pop-up ads

B. native ads

47. Which of the following is NOT a major threat to wireless networks? A. eavesdropping B. tapping C. rogue access points D. radio-frequency jamming

B. tapping

40.Primary storage does NOT store the following: A.Data to be processed by the CPU B.Information for the organization's ERP system C.Instructions for the CPU as to how to process the data D.Operating system programs that manage various aspects of the computer's operation

B.Information for the organization's ERP system

34.Moore's law predicted microprocessor complexity would double approximately every _______ months. A.6 B.12 C.18 D.24

C. 18

8. Users began bringing their own PCs to work in the ______ to improve their _________. A. 1960s; productivity B. 1960s; profitability C. 1970s; productivity D. 1970s; profitability

C. 1970s; productivity

47. _____ percent of GIS users employ Environmental Systems Research Institute products. A. 20 B. 50 C. 70 D. 100

C. 70

1. The rule of thumb in the wireless industry is that a smartphone uses 4 gigabytes of data per month where ____ percent travels through Wi-Fi. A. 25 B. 50 C. 75 D. 100

C. 75

49. ___ percent of organizational breaches exploit weak or stolen user credentials. A. 26 B. 51 C. 76 D. 99

C. 76

30._____________________ is a source-data automation input device. A.A digital pen B.A graphics tablet C.A point-of-sale terminal D.Voice recognition

C. A point-of-sale terminal

28.____________ is a human data-entry device. A.An ATM B.A barcode scanner C.A trackball D.RFID

C. A trackball

28. A(n) ____________ portal is for critical business information inside and outside the organization. A. Affinity B. Commercial C. Corporate D. Industrywide

C. Corporate

34. Which of the following is NOT a disadvantage of web-based call centers located overseas? A. Communication B. Control C. Cost D. Security

C. Cost

32. _________ are/is the largest-volume application running over the Internet. A. Blogs B. Chat rooms C. Email D. Voice

C. Email

55. __________________ is a supporter of network neutrality. A. AT&T B. Comcast C. FCC D. Verizon

C. FCC

11. ____________ purchased Skybox in 2014 to keep its maps updated. A. Amazon B. Facebook C. Google D. Microsoft

C. Google

21. ____________ is installing and operating ultrafast fiber-optic cable service. A. AT&T B. Comcast C. Google D. Verizon

C. Google

47. _______ describes how data should look on a web site; ______ describes data being exchanged between business partners. A. EDI; HTML B. EDI; XML C. HTML; XML D. XML; HTML

C. HTML; XML

10.Which of the following is NOT one of the most important issues for businesspeople in regard to hardware? A.What the hardware enables B.How it is advancing C.How much it costs D.How rapidly it is advancing

C. How much it costs

19. ___________ was implemented to address smartphones, since they are basically hand- held computers. A. IPv4 B. IPv5 C. IPv6 D. IPv7

C. IPv6

38. The adoption of __________ has been an important factor in the development of the Internet of Things. A. IPv1 B. IPv4 C. IPv6 D. IPv8

C. IPv6

9. _____________ is an advantage of twisted-pair wire. A. Difficult to tap B. Higher bandwidth C. Inexpensive D. Less susceptible to electromagnetic interference

C. Inexpensive

21. ___________ is threatening to steal or actually stealing information from a company and then demanding payment to not use or release that information. A. Competitive intelligence B. Espionage C. Information extortion D. Intellectual property

C. Information extortion

39. A(n) ____________________ is a software program that assists you in performing repetitive computer-related tasks. A. Expert system B. Genetic algorithm C. Intelligent agent D. Neural network

C. Intelligent agent

41. Microsoft's Clippy is an example of a(n)_______. A. Expert system B. Genetic algorithm C. Intelligent agent D. Neural network

C. Intelligent agent

29. Which of the following is a use of fuzzy logic? A. Combatting fraud B. Designing processes C. Internet searches D. Optimizing store displays

C. Internet searches

44. Biometrics is something the user _______. A. Does B. Has C. Is D. Knows

C. Is

31. Which of the following is NOT a reason cloud computing has a positive impact on employees? A. It allows employees to use whatever device they want. B. It gives them access to organizational information no matter where they are. C. It helps them save money since they can do everything on a single device. D. It increases their overall productivity.

C. It helps them save money since they can do everything on a single device.

44.Which of the following is FALSE of secondary storage?A.It is nonvolatile. B.It takes more time to retrieve data from it than from RAM. C.It is more expensive than primary storage. D.It can utilize a variety of media, each with its own technology.

C. It is more expensive than primary storage.

5. This stage in the evolution of the modern IT infrastructure was characterized by connecting personal PCs to work systems. A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs

C. LANs (client/server computing)

19.__________ organizations typically utilize supercomputers .A.Small B.Medium C.Large D.Extra-large

C. Large

4. Which of the following is a characteristic of AI? A. Difficult and expensive to duplicate and disseminate knowledge B. Erratic and inconsistent total cost of knowledge C. Low creativity D. Knowledge isn't preserved well

C. Low creativity

8. ______________ satellites require medium-powered transmitters. A. GEO B. LEO C. MEO D. SEO

C. MEO

21.Which of the following is NOT a PC? A.Desktop personal computer B.Mac C.Mainframe D.Microcomputer

C. Mainframe

3. This stage in the evolution of the modern IT infrastructure was characterized by remote job entry. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe

C. Mainframe and dumb terminals

22. Which of the following is NOT a challenge mentioned in the case that Avaya faced when setting up the 2014 Sochi Winter Olympic Games? A. Delivering high-definition TV channels B. Handling an unprecedented number of mobile devices C. Managing language barriers between technicians and athletes D. Moving goods safely into Russia

C. Managing language barriers between technicians and athletes

28. Fuzzy logic is a branch of _________. A. Computer science B. Engineering C. Mathematics D. Philosophy

C. Mathematics

21. Which of the following is NOT a major BI vendor? A. Business Objects B. Cognos C. Microsoft D. SAS

C. Microsoft

29._________ is a gesture-based input device. A.A touchpad B.A trackball C.Microsoft Kinect D.Microsoft Office

C. Microsoft Kinect

33. Cloud computing can enable companies to collect massive amounts of data and then use sophisticated algorithms to make sense of that data to create better products and services. This characterizes which of the following benefits of cloud computing? A. Customizing products and services B. Expanding the scope of business operations C. Mining insights from data D. Responding quickly to market changes

C. Mining insights from data

34. The _____________ model at the Miami Children's Hospital is most appropriate for nonemergency, consultative services because the physician is limited to a visual examination. A. Dynamic B. Extremely static C. Mobile D. Semistatic

C. Mobile

24. ____________ means that users carry a device with them and can initiate a real-time contact with other systems from wherever they happen to be. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

C. Mobility

4. Which of the following is NOT an overall trend in hardware? A.Cheaper B.Faster C.More complex D.Smaller

C. More complex

3.Computer technologies become obsolete _________ other organizational technologies. A.at the same time as B.less often than C.more quickly than D.irrelevantly different than

C. More quickly than

35. ____________________ randomly tries combinations and then evaluates the success or failure of each outcome. A. Crossover B. Expertise C. Mutation D. Selection

C. Mutation

14. Which of the following is the technology that enables most mobile wallet applications? A. AFC B. ERP C. NFC D. VRP

C. NFC

14. The ____________ protocol places packets on, and receives them from, the network medium. A. Application B. Internet C. Network interface D. Transport

C. Network interface

34. Multidimensional analysis is also called ________. A. DSS B. ERP C. OLAP D. OLTP

C. OLAP

25. Personal application software is an example of ____________. A. Customized application software B. Customized systems software C. Off-the-shelf application software D. Off-the-shelf systems software

C. Off-the-shelf application software

31. Retailers that use location-based services like iBeacon favor a(n) ___________ option to avoid alienating customers. A. L-commerce B. M-commerce C. Opt-in informed consent D. Opt-out informed consent

C. Opt-in informed consent

33. A genetic algorithm is a(n) ___________ method. A. Biological B. Minimizing C. Optimizing D. Philosophical

C. Optimizing

9.______________________ technologies present data and information in a form people can understand. A.Input B.Primary C.Output D.Secondary

C. Output

4. From smallest to largest, which of the following is in the correct order? A. LAN, PAN, MAN, WAN B. LAN, MAN, PAN, WAN C. PAN, LAN, MAN, WAN D. PAN, MAN, LAN, WAN

C. PAN, LAN, MAN, WAN

27. With _________, the customer manages applications and data while the vendor manages the operating system, servers, virtualization, storage, and networking. A. DaaS B. IaaS C. PaaS D. SaaS

C. PaaS

28. _____________________ allows customers to both run existing applications and to develop and test new applications. A. DaaS B. IaaS C. PaaS D. SaaS

C. PaaS

17. A __________________________ expert system develops plans to achieve goals. A. Design B. Interpretation C. Planning D. Prediction

C. Planning

53. Which of the following is an argument FOR network neutrality? A. Handling the exploding demand for internet and wireless B. Impact on capital investments C. Possibilities of censorship D. Price discrimination

C. Possibilities of censorship

2. Which of the following is NOT a reason telecommunications companies want to transition away from the "plain old telephone system"? A. Cost B. Popularity C. Power concerns D. Stock prices

C. Power concerns

46. If you use airfarewatchdog.com to wait for the cheapest possible plane ticket to Australia for your summer vacation, this is an example of a __________ agent. A. Information B. Personal C. Predictive D. User

C. Predictive

47. _________ agents constantly observe and report on some item of interest. A. Information B. Personal C. Predictive D. User

C. Predictive

32. A major issue facing Cardlytics is ________. A. Cost B. Integration C. Privacy D. Training

C. Privacy

35.Moore's law has NOT had an impact on ______. A.Cost B.Performance C.Productivity D.Speed

C. Productivity

17. Google Drive is an example of a ___________ cloud. A. Hybrid B. Private C. Public D. Vertical

C. Public

20. ____________ clouds are the least expensive. A. Hybrid B. Private C. Public D. Vertical

C. Public

43.Which of the following is primary storage? A.Magnetic disk B.Magnetic tape C.RAM D.SSDs

C. RAM

7. PLASMA is used in the ________ industry to mimic the complex behavior of ________. A. Healthcare; dispatchers B. Healthcare; doctors C. Railroad; dispatchers D. Railroad; doctors

C. Railroad; dispatchers

9. Which of the following is NOT part of the Software Engineering Institute's definition of good software? A. Cost-effective B. Defect-free C. Readable D. Maintainable

C. Readable

15. ______________________ is NOT a benefit of virtualization. A. Lower fixed costs B. Lower variable costs C. Redundancy D. Scalability

C. Redundancy

38. When a site like Google Docs becomes unavailable for any period of time, this fuels the cloud computing concern of ________. A. Legacy IT systems B. Privacy C. Reliability D. Security

C. Reliability

12. Knowledge __________________________ occurs when knowledge is organized as rules or frames and stored electronically in a knowledge base. A. Acquisition B. Inferencing C. Representation D. Transfer

C. Representation

13. Which of the following is a decisional role? A. Analyzer B. Liaison C. Resource allocator D. Spokesperson

C. Resource allocator

36. Which of the following is a disadvantage of telecommuting for employers? A. Isolation B. Promotions C. Security D. Visibility

C. Security

40. Moving legacy systems to the cloud is difficult. Which of the following does NOT explain this phenomenon? A. Complexity B. Money spent C. Security D. User resistance

C. Security

36. ______________ analysis is the study of the impact that changes in one or more parts of a decision-making model have on other parts. A. Goal-seeking B. Market basket C. Sensitivity D. What-if

C. Sensitivity

11. Which of the following is NOT a characteristic of cloud computing? A. Grid and utility computing B. Pooling computing resources C. Server centralization on the internet D. Utilizing broad network access

C. Server centralization on the internet

13. NFC is an example of ______________ wireless networks. A. Long-range B. Medium-range C. Short-range D. Wide-area

C. Short-range

7. An advantage of a radio transmission system is ____________. A. Large coverage area B. Relatively inexpensive C. Signals pass through walls D. All of the above

C. Signals pass through walls

8. Which of the following is NOT part of the Software Engineering Institute's definition of good software? A. Cost-effective B. Reliable C. Strategic D. Usable

C. Strategic

6. _________________ software is an intermediary between computer hardware and _________________ software. A. Application; programming B. Application; systems C. Systems; application D. Systems; programming

C. Systems; application

1.Which of the following is FALSE? A.Hardware becomes obsolete more quickly than other organizational technologies. B.Knowing when to purchase hardware is one of the biggest difficulties. C.Technology is getting more advanced, so it tends to get more expensive as time progresses. D.You need to understand hardware because you may be making decisions about hardware purchases or upgrades.

C. Technology is getting more advanced, so it tends to get more expensive as time progresses.

38. Which of the following is FALSE? A. Email is often associated with information overload and stress. B. Email is the dominant form of communication in business and in education. C. The Atos case demonstrates that it is possible to cut out e-mail entirely. D. The fast-paced and collaboration-based business environment makes email less useful.

C. The Atos case demonstrates that it is possible to cut out e-mail entirely.

29. Which of the following is TRUE of the web? A. Quality assurance is managed by search engines like Google. B. The amount of information on the web quadruples every year. C. The fundamental rule about information on the web is "user beware". D. The Web is truly socialist since anyone can post information to it.

C. The fundamental rule about information on the web is "user beware".

39. Which of the following is NOT a limitation of bar codes? A. They can be easily ripped, soiled, or lost. B. They don't identify individual items. C. They don't identify the manufacturer. D. They require line of site.

C. They don't identify the manufacturer.

48. Auditing __________ the computer means inputs, outputs, and processing are checked. A. Around B. Into C. Through D. With

C. Through

11. _____________ is the most prevalent form of communications wiring. A. Coaxial cable B. Fiber optics C. Twisted-pair wire D. Wireless

C. Twisted-pair wire

50. _________ is a registry for searching web services. A. SOAP B. XML C. UDDI D. WSDL

C. UDDI

7. Business analytics answers the question ___________ A. What actions are needed? B. What happened? C. What is the best (or worst) that can happen? D. Where is the problem?

C. What is the best (or worst) that can happen?

6. BI answers the question _________________ A. What will happen if these trends continue? B. What will happen next? C. Where is the problem? D. Why is this happening?

C. Where is the problem?

2. Telecommunications around the world are shifting to ________ networks. A. cellular B. mobile C. Wi-Fi D. VoIP

C. Wi-Fi

19. ____________ enables peer-to-peer communications and allows users to transfer content among devices without having to rely on a wireless antenna. A. MiFi B. Wi-Fi C. Wi-Fi Direct D. Super Wi-Fi

C. Wi-Fi Direct

16. Public clouds are ______________________. A. accessed through an extranet B. accessed through an intranet C. accessed through the internet D. stretched across different businesses

C. accessed through the internet

11.While the ______________ of hardware is constantly decreasing, the ______________ is constantly increasing. A.complexity; cost B.cost; complexity C.cost; performance D.performance; cost

C. cost; performance

35. Cloud computing delivers computing services ___________ on-premise computing. A. at the same time as B. can't compete with C. faster than D. slower than

C. faster than

22. Google's main business reason for installing fiber in select US cities is to _______. A. begin competing with the cable distribution giants B. bring the internet to rural areas C. generate more web traffic, which generates more ad revenue for them D. give people an option other than the telecommunications companies who control existing cable networks

C. generate more web traffic, which generates more ad revenue for them

13. The airport's self check-in computers are a(n) __________ threat. A. outside B. employee C. hardware D. software

C. hardware

11. RentRange is currently in the _______ industry but could move to the ________ industry. A. credit card; housing B. credit card; home appliance C. housing; credit card D. housing; home appliance

C. housing; credit card

26.A keyboard is an example of __________________. A.a communication device B.an output device C.human data-entry D.source-data automation

C. human data-entry

20. The web __________ the same thing as the internet. A. could be B. is C. is not D. I don't know

C. is not

51. The main problem with multifactor authentication is _____________. A. it's a single point of failure B. it's too hard to do C. it will invade our privacy D. there are no problems with multifactor authentication

C. it will invade our privacy

39. If you hire a cybersecurity company like FireEye to identify security weaknesses in your information systems, you are using a risk _________ strategy. A. acceptance B. analysis C. limitation D. transference

C. limitation

12. Cloud computing _____________________, which means a customer can access needed computing resources automatically. A. encompasses the characteristics of grid computing B. encompasses the characteristics of utility computing C. provides on-demand self-service D. utilizes broad network access

C. provides on-demand self-service

6. ujam is ____________ that uses ________ to produce sophisticated harmonies, bass lines, drum tracks, horn parts, etc. A. hardware; algorithms B. hardware; instinct C. software; algorithms D. software; instinct

C. software; algorithms

30. If you wanted to calculate your average in this class right now, you would use a __________ personal application software package. A. personal information management B. presentation C. spreadsheet D. word processing

C. spreadsheet

2. The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________. A. sell social security numbers B. steal credit card numbers C. stop the release of the move The Interview D. threaten the US government

C. stop the release of the move The Interview

35. The Shodan case illustrates ___________. A. how vulnerable all devices are, even if they aren't connected to the internet B. strong passwords aren't necessary on home devices since most hackers don't care about such a small target C. that hackers and security researchers use the same sites to identify vulnerabilities D. the government is doing nothing to protect our privacy

C. that hackers and security researchers use the same sites to identify vulnerabilities

44. Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device. A. an extranet B. an intranet C. the internet D. the telephone

C. the internet

40. When you use Google Drive to work on a document with a classmate, this is considered _________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow

C. virtual collaboration

10. Enterprise computing was introduced in the _____________________. A. 1950s B. 1960s C. 1970s D. 1990s

D. 1990s

44. Reality mining is a type of _____________. A. Dashboard B. Database C. Data mining D. Data visualization technology

D. Data visualization technology

23. Small companies typically use _______ for their BI. A. Dashboards B. Data mining C. Data visualization D. Excel

D. Excel

45. Environmental Systems Research Institute is an international supplier of _________. A. AI B. DSS C. ERP D. GIS

D. GIS

5. Which of the following is NOT a software trend? A. Increasing complexity B. Increasing cost C. Increasing number of defects D. Increasing resistance to use

D. Increasing resistance to use

14. In which stage of the IDC do you examine the problem? A. Choice B. Design C. Implementation D. Intelligence

D. Intelligence

45.Which of the following is TRUE of secondary storage?A.It is volatile. B.It takes less time to retrieve data from it than from RAM. C.It is more expensive than primary storage. D.It can utilize a variety of media, each with its own technology.

D. It can utilize a variety of media, each with its own technology.

17. Which of the following is NOT a function of systems software? A. It controls and supports the computer system and its information-processing activities. B. It helps users and IT personnel program, test, and debug their own computer programs. C. It provides commonly used sets of instructions for all applications. D. It provides specific functionality to a user for word processing

D. It provides specific functionality to a user for word processing

42. Status access is the latest data available on _____________, often in real time. A. CRM B. CSF C. ERP D. KPI

D. KPI

8. Vertical searching is used by sites like ________ and is a threat to __________. A. Google; Facebook B. Google; Kayak C. Facebook; Google D. Kayak; Google

D. Kayak; Google

20.Whichof the following is NOT a microcomputer? A.Desktop personal computer B.PC C.Mac D.Mainframe

D. Mainframe

20. _______________ usually involve a large number of processors operating in parallel. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

D. Neural networks

24. ___________ are used to research diseases like Alzheimer's, Parkinson's, and epilepsy. A. Expert systems B. Genetic algorithms C. Intelligent agents D. Neural networks

D. Neural networks

25. _______________ are "trained" by being fed large amounts of data and rules about data relationships. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

D. Neural networks

26. Machine learning systems often use _________ to learn from data. A. Expert systems B. Fuzzy logic C. Genetic algorithms D. Neural networks

D. Neural networks

3. _________________ was originally accused of the Sony Picture Entertainment hack on November 24, 2014; their involvement ____________ been proved. A. China; has B. China; has not C. North Korea; has D. North Korea; has not

D. North Korea; has not

14. "Best of breed" fits under which software issue? A. Defects B. Licensing C. Open source D. Open systems

D. Open systems

19. The Heartbleed bug is an encryption security flaw in the ___________ software package that was an _____________ mistake by the software developer. A. Microsoft; intended B. Microsoft; unintended C. OpenSSL; intended D. OpenSSL; unintended

D. OpenSSL; unintended

38. Genetic algorithms are most often utilized in the __________ department. A. Accounting B. Customer service C. Human resources D. Operations

D. Operations

16. A __________________________ expert system infers likely consequences of a given situation. A. Diagnosis B. Interpretation C. Planning D. Prediction

D. Prediction

23. Which of the following is a use of neural networks? A. Designing processes B. Identifying income categories C. Optimizing store displays D. Preventing money-laundering

D. Preventing money-laundering

32. The drawback of __________ for location-based tracking is that they require users to open a specific app to take a clear photo. A. GPS B. iBeacon C. NFC D. QR codes

D. QR codes

40. ________________ store information horizontally and vertically. A. Active RFID tags B. Bar codes C. Passive RFID tags D. QR codes

D. QR codes

42. Marks & Spencer implemented _______ to track its inventory more effectively. A. Bar codes B. Optical scanners C. QR codes D. RFID

D. RFID

32. Cloud computing can enable companies to shift from capital expenses to operational expenses. This characterizes which of the following benefits of cloud computing? A. Expanding the scope of business operations B. Making individuals more productive C. Mining insights from data D. Reducing costs

D. Reducing costs

18. A __________________________ expert system executes a plan to administer a prescribed remedy. A. Debugging B. Diagnosis C. Monitoring D. Repair

D. Repair

36. _______________ is a process whereby the organization takes concrete actions against risks, such as implementing controls and developing a disaster recovery plan. A. Risk B. Risk analysis C. Risk management D. Risk mitigation

D. Risk mitigation

42.Which of the following is secondary storage? A.Cache memory B.ROM C.Registers D.SSDs

D. SSDs

29. With _______________, the user has no control of software beyond user configuration. A. IaaS B. OaaS C. PaaS D. SaaS

D. SaaS

30. With _________, the vendor manages the applications and data. A. IaaS B. OaaS C. PaaS D. SaaS

D. SaaS

23. You start browsing your favorite home improvement company's website and notice someone has changed all the logos to their main competitor's logos. This is an example of ___________. A. Espionage B. Identity theft C. Information extortion D. Sabotage

D. Sabotage

7.__________________ storage stores data and programs for future use. A.Input B.Primary C.Output D.Secondary

D. Secondary

41. Least privilege is a concept associated with ___________________. A. Legacy IT systems B. Privacy C. Reliability D. Security

D. Security

36. If you want to evaluate the best product to market to your customers every month, you would use the __________ functional characteristic of a genetic algorithm. A. Crossover B. Expertise C. Mutation D. Selection

D. Selection

35. The ___________ model utilizes rented carts where patients receive a live consultation with a Miami Children's Hospital specialist working out of the Miami command center. A. Dynamic B. Extremely static C. Mobile D. Semistatic

D. Semistatic

10. Skybox is disrupting the space-based commercial imaging industry by focusing on ________. A. Communications B. Databases C. Hardware D. Software

D. Software

12. Piracy is an issue associated with ________. A. Open systems B. Open-source software C. Software defects D. Software licensing

D. Software Licensing

22. Phishing is an example of __________. A. Copyright infringement B. Espionage C. Sabotage D. Software attack

D. Software attack

48.__________ are the fastest form of secondary storage. A.Optical storage devices B.Magnetic disks C.Magnetic tapes D.Solid-state drives

D. Solid-state drives

41. According to the "Catching a Hacker" case, ____________ is one of the most sophisticated and destructive malicious software programs ever developed. A. the Heartbleed bug B. FireEye C. Shodan D. SpyEye

D. SpyEye

4. This stage in the evolution of the modern IT infrastructure represented the original BYOD phenomenon. A. Cloud and mobile computing B. Enterprise computing C. LANs (client/server computing) D. Stand-alone PCs

D. Stand-alone PCs

2. This stage in the evolution of the modern IT infrastructure was characterized by IT personnel being the only one with access. A. Enterprise computing B. LANs (client/server computing) C. Mainframe and dumb terminals D. Stand-alone mainframe

D. Stand-alone mainframe

2.Decisions about hardware are NOT focused on __________. A.Appropriateness for the task B.Cost C.Speed D.Strategic value

D. Strategic Value

7. Hardware interacts directly with _______________ software. A. Application B. Documentation C. Programming D. Systems

D. Systems

28. ______________________ is the wireless transmission and receipt of data gathered from remote sensors. A. A mobile portal B. A voice portal C. The Internet of Things D. Telemetry

D. Telemetry

5._____________ manipulates the data and controls the tasks performed by the other components. A.AI B.EDI C.ERP D.The CPU

D. The CPU

42. Safe harbors address the concerns associated with __________. A. Criminal use of cloud computing B. Legacy IT systems C. Reliability of cloud computing services D. The regulatory and legal environment

D. The regulatory and legal environment

21. The Sochi Winter Games were similar to the Vancouver Winter Games in what respect? A. Both cities had a fairly modern basic IT infrastructure that was improved for the Games. B. The wireless networks of both were able to handle 4 Tbps per second. C. Wireless traffic outnumbered wired traffic by 4:1 for both. D. They both utilized the services of Avaya to get their cities ready for the Games.

D. They both utilized the services of Avaya to get their cities ready for the Games.

23.If ________ clients lose access to the internet, they can't do much. A.Fat B.Heavy C.Skinny D.Thin

D. Thin

22. In the past, BI was used to support __________. A. Corporate boards B. Low-level managers C. Middle-level managers D. Top managers

D. Top managers

13. You are the HR manager at ABC Corp. You are using an expert system to "score" candidates for the new sales manager job. The scores you receive are an example of knowledge __________. A. Acquisition B. Inferencing C. Representation D. Transfer

D. Transfer

41. ____________ is the short-, medium-, and long-term trends of metrics, which is projected using forecasting methods. A. CSF B. Drill-down C. KPI D. Trend analysis

D. Trend analysis

2. The __________________ test proposes a scenario in which a man and a computer both pretend to be women or men, and a human interviewer has to identify which is the real human. A. Google B. SkyNet C. Terminator D. Turing

D. Turing

1. Telecommunications companies want to get rid of their _____________ networks and replace them with ____________. A. Coaxial cable; fiber optics networks B. Coaxial cable; IP systems C. Twisted-pair copper wire; fiber optics networks D. Twisted-pair copper wire; IP systems

D. Twisted-pair copper wire; IP systems

17. Which of the following is a short-range wireless network? A. MiFi B. WiMAX C. WLAN D. UWB

D. UWB

25. _____________ means a mobile device can provide information and communication regardless of the user's location. A. Broad reach B. Instant connectivity C. Mobility D. Ubiquity

D. Ubiquity

16. __________________ problems are fuzzy and complex. A. Semistructured B. Structured C. Unistructured D. Unstructured

D. Unstructured

32. Fuzzy logic is best for handling _________ data and decisions. A. Partially structured B. Semistructured C. Structured D. Unstructured

D. Unstructured

49. The auto-fill functionality on your web browser is a(n) _________ agent. A. Buyer B. Information C. Predictive D. User

D. User

14. SaaS is a type of __________ computing. A. Grid B. Mainframe C. Mobile D. Utility

D. Utility

15. Which of the following is NOT an unintentional threat to information systems? A. Careless monitoring of environmental hazards B. Choosing a weak password C. Having an unlocked desk or filing cabinet after going home D. Viruses

D. Viruses

5. ____________ are networks that aren't contiguous. A. LAN B. MAN C. PAN D. WAN

D. WAN

7. The Internet is a ______________. A. LAN B. MAN C. PAN D. WAN

D. WAN

49. __________ is used to create the XML document that describes the tasks performed by the various web services. A. HTML B. SOAP C. UDDI D. WSDL

D. WSDL

45. _____________ is the act of locating WLANs while driving around a city. A. A rogue access point B. Eavesdropping C. RF jamming D. War driving

D. War driving

37. If you are trying to figure out the impact of a 2 versus a 4 percent inflation rate on your profit, that is a ______________ analysis. A. Goal-seeking B. Market basket C. Sensitivity D. What-if

D. What-if

35. Data mining helps explain _____________ happened. A. How B. What C. When D. Why it

D. Why it

15.Which of the following is an example of what a client does? A.Processing email B.Processing web sites C.Running networks D.Word processing

D. Word processing

26. A ___________ is a remote attack requiring user action. A. back door B. denial-of-service attack C. logic bomb D. phishing attack

D. phishing attack

53. The Target data breach started with a ____________. A. back door B. denial-of-service attack C. logic bomb D. phishing attack

D. phishing attack

10. RentRange uses _____________ to provide information about purchasing foreclosed and low-priced single-family homes and then renting them out. A. data visualization B. dashboards C. historical analytics D. predictive analytics

D. predictive analytics

1. AI is NOT concerned with _______________. A. building computers and robots with intelligence B. studying the thought processes of humans C. recreating the thought processes of humans via machines D. replacing workers with machines to reduce costs

D. replacing workers with machines to reduce costs

51. Facebook has busted the myth that _________. A. businesses can't use social networking sites B. privacy isn't that important C. security is paramount in any industry D. small screens inhibit big, flashy ads

D. small screens inhibit big, flashy ads

19. R&D tasks are ________________. A. operational and structured B. operational and unstructured C. strategic and structured D. strategic and unstructured

D. strategic and unstructured

48. Sentiment analysis extracts _________ information in source materials, which is particularly useful in __________. A. objective; business databases B. objective; social media C. subjective; business databases D. subjective; social media

D. subjective; social media

25. CPM is closely aligned with ___________ A. the development of one or a few related BI applications B. the development of infrastructure to support enterprise BI C. support for business analytics as a subcategory of BI D. support for organizational transformation

D. support for organizational transformation

29. The key fob you use to open your car before you get to it is an example of _______. A. a mobile portal B. a voice portal C. mobile commerce D. telemetry

D. telemetry

45. E-learning refers to learning supported by __________. A. an extranet B. an intranet C. the internet D. the web

D. the web

50. One of the reasons for Facebook shares to drop by 50 percent from the IPO was _____. A. the failure of Sponsored Stories B. the irritating nature of their ads C. their abuse of consumers' privacy D. their neglect of mobile advertising

D. their neglect of mobile advertising

33. The main purpose of Cardlytics is to ______________. A. collect personally identifying information B. securely share customer information between banks and merchants C. target potential new customers for retailers D. track and understand consumer buying behavior

D. track and understand consumer buying behavior

37. You have a small business that has had problems with malware on your employees' computers. You decide to hire a third-party company such as GFI Software to implement security controls and then monitor your company's systems. You are adopting a risk ________ strategy. A. acceptance B. analysis C. limitation D. transference

D. transference

Metals and thick liquids can interfere with RFID signals, so Marks & Spencer _____. A. can only tag 50% of its merchandise B. can only tag 75% of its merchandise C. uses more powerful ID tags to capture the other 75% of its merchandise D. uses more powerful ID tags to ensure 100% of its merchandise are tagged

D. uses more powerful ID tags to ensure 100% of its merchandise are tagged

43. Telepresence is a version of ____________. A. email B. a portal C. unified communication D. videoconferencing

D. videoconferencing

42. When you exchange documents with your co-workers through organization-approved methods, this is considered __________. A. crowdsourcing B. teleconferencing C. virtual collaboration D. workflow

D. workflow


Ensembles d'études connexes

*Life Insurance Policies, provisions, options, riders (30%)

View Set

Anatomy and Physiology: The Heart

View Set

Chapter 13 - User Groups and Permissions

View Set