ISYS Exam 2 UARK

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Java and C++ are examples of _____. a. assembly language b. high-level languages c. machine language d. compiler languages

b. high-level languages

In the URL http://www.rentalmarti.com/suv/news.html Which part indicates the name of the document? a. HTTP b. news.html c. www.rentalmarti.com d. suv

b. news.html

In a(n) _____ topology, if any link between nodes is severed, the entire network is affected, and the failure of a single node disrupts the entire network. a. octagonal b. ring c. mesh d. star

b. ring

What is needed for information software to perform? a. High-speed Internet b. An older model PC or tablet c. A current model PC or tablet d. Increased throughput

c. A current model PC or tablet

How is an ATM an example of TPS? a. TPS is used to authenticate users, verify funds, perform the requested action, and update accounts, if necessary, without the human intervention of a teller. b. ATMs use biometric information to confirm a person's identity. c. ATM completes automated tasks much slower and carefully. d. TPS is used to disburse funds after the teller authorizes it.

a. TPS is used to authenticate users, verify funds, perform the requested action, and update accounts, if necessary, without the human intervention of a teller.

A grocery retailer offering club cards that give customers big discounts is one example of an overall cost leadership strategy. a. True b. False

a. True

A hurricane has knocked out a server farm in a region. The organization should assign personnel to document all actions taken to regain normality during recovery. a. True b. False

a. True

Apache Hadoop is the most commonly used platform for big data analytics. a. True b. False

a. True

ENIAC is an example of a first-generation computer. a. True b. False

a. True

Ergonomics experts believe better-designed furniture can solve many health problems related to computer equipment. a. True b. False

a. True

The object-oriented programming language principle of inheritance is a feature that reduces application development time by allowing objects to inherit existing code rather than rewriting it. a. True b. False

a. True

With employee-monitoring systems, managers can supervise employees' work speeds. a. True b. False

a. True

Offering a service that makes it difficult to switch is an example of what type of strategy? a. Compliance b. Rivalry c. Cost d. Differentiation

d. Differentiation

A college freshman posted a picture on social media of underage consumption. The next day they regretted the decision and worried about how it would impact their summer internship opportunities. They have asked you to help remove it from the Internet. How would you respond? a. You can remove the post, but once something is on the Internet, it is almost impossible to remove it altogether. b. You can email the social media company asking them to remove the image. c. You can remove the image, and it will never be found again on the Internet. d. It is impossible to remove a post from a social media profile.

a. You can remove the post, but once something is on the Internet, it is almost impossible to remove it altogether.

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it. a. confidentiality b. reliability c. availability d. integrity

a. confidentiality

In general, _____ lasts the author's lifetime plus 70 years and does not need to be renewed. a. copyrights b. aero designs c. industrial designs d. patents

a. copyrights

In object-oriented databases, _____ is when objects are grouped along with their attributes and methods into a class. a. encapsulation b. fragmentation c. optimization d. allocation

a. encapsulation

The most serious problem with wikis is the: a. inaccuracy of content. b. lack of data privacy. c. inability to modify content. d. restricted access to the general public.

a. inaccuracy of content.

A security analyst has seen the system performance slow after installing a logic design application. The application contains a Trojan program, but the performance issue spreads across the network. What is the most likely cause of this issue? a. logic bomb b. Shoulder surfing c. Dumpster diving d. rootkit

a. logic bomb

Abstraction, inheritance, polymorphism, and encapsulation are four key principles of ________. a. object-oriented programming b. network-attached storage c. machine language d. fifth-generation languages

a. object-oriented programming

In the context of Porter's Five Forces Model, an organization limits buyers' choices by: a. offering services that make it difficult for customers to switch. b. launching duplicate products or services in the marketplace. c. charging competitive market rates for its products or services. d. encouraging the use of the Internet to gather information about products.

a. offering services that make it difficult for customers to switch.

A truck company and a retailer are business partners. Wanting to provide the best service, the truck company wants to share the location of their trucks with the retailer. Which of the following is the best way to do that? a. Share the truck's location through an extranet between the two companies. b. Give the retailer manager access to the truck company's intranet. c. Publish the information of the truck's locations on the Internet. d. Give the manager of the truck company access to the retailer's intranet.

a. Share the truck's location through an extranet between the two companies.

When considering the basic tasks of computers, which of the following is considered an arithmetic operation? a. Subtracting 10 percent from a sales amount to apply a discount b. Retrieving data, updating a value, and saving the updated data c. Comparing x to y to determine which has a larger value d. Saving a file to a new location

a. Subtracting 10 percent from a sales amount to apply a discount

The City of Copenhagen used the Internet of Things to reduce water loss by implementing _____. a. smart sensors b. smart pipes c. low water pressure technology d. email reminders

a. smart sensors

Why do online classes reduce the cost of having renowned experts lecture? a. Online lectures require less work than on campus. b. Travel expenses are not a factor. c. There are no printed handouts. d. The students can access it remotely.

b. Travel expenses are not a factor.

Your company needs to survey a site to determine the occurrence of the company trademark name. If the company wants to automate the task, which of the following tools is best? a. Bookmarks b. Web crawler c. Indexer d. Web browser

b. Web crawler

Computers and communication systems use _____ to represent information between computers and network systems. a. nanotubes b. data codes c. source codes d. servers

b. data codes

Which of the following statements best demonstrates how a data mart is used? a. A specific department or division uses the data mart designed for them. b. A data mart is used by the IT support staff and is not available to others. c. Each employee uses and owns one specific data mart. d. A data mart is designed for an entire organization's use.

a. A specific department or division uses the data mart designed for them.

How does TCP/IP address the portability problem? a. By specifying the format of messages between devices, a device can communicate with any other device using the same protocol. b. By dealing with the details of hardware connections, different platforms can communicate. c. By giving a routing algorithm, a device can find any other device in the network and communicate with it. d. By providing the standard for the communication medium such as Ethernet, coaxial wires, and optic fiber.

a. By specifying the format of messages between devices, a device can communicate with any other device using the same protocol.

A locally owned restaurant is trying to compete with another restaurant that moved into town. The owners of the locally owned restaurant have a background in application development. What is an example of how the owners can use their skills to stay competitive against the national chain? a. Create a mobile app that customers could use to see promotions and collect points b. Create a mobile application that gives directions to the restaurant c. Create a mobile application that encourages all customers to boycott the new restaurant d. Ignore the new restaurant and trust your customer's loyalty to your restaurant

a. Create a mobile app that customers could use to see promotions and collect points

In large organizations, which of the following tasks would not be completed by a database administrator? a. Designing application programs b. Change management c. Planning for security d. Backup and recovery management

a. Designing application programs

The HR department wants to implement new changes in the office cafeteria. They want to receive comments and suggestions from the employees. Which of the following tools is more appropriate for the task? a. Discussion Group b. E-Mail c. Instant Messaging d. Newsgroups

a. Discussion Group

The use of electronic company polls for employees satisfaction can be considered an example of data communication use because: a. It Is a way of communication between the employees and the management. b. Data communication is about bringing people closer through electronic mediums. c. The information on employee satisfaction is critical in a successful organization. d. The data from the polls is transferred to the management.

a. It Is a way of communication between the employees and the management.

Which of the following is considered a basic task in the context of computer operations? a. Logical operations b. Word processing c. Natural language processing d. Connecting to the Internet

a. Logical operations

How has technology helped small businesses differentiate themselves? a. Offer better and faster customer service b. Hire more people to serve customers. c. Offer less expensive services. d. Help avoid charging customers' sales tax

a. Offer better and faster customer service

There is only one practicing physician's clinic in a three-county radius. How could a clinic's resources be better utilized if Internet technology provides better support? a. Offer telemedicine visits to patients before they make the trip to the clinic location. b. Deliver prescriptions easier. c. Having patients search online about their symptoms before scheduling an appointment with the physician. d. Send prescriptions to the pharmacy without speaking with the patient.

a. Offer telemedicine visits to patients before they make the trip to the clinic location.

Which healthcare system can make interactive medical tools available to the public? a. Personal health information systems b. The well-being model c. Medicine endorsement systems d. The out-of-pocket model

a. Personal health information systems

One of the new technologies with Web 3.0 is VR technology. How do retail businesses use this new technology to develop their employees? a. Provides training to employees to perform job functions b. Tracks the location and productivity of employees c. Tracks the location of inventory items d. Reduce the need to stock shelves by offering everything for sale virtually

a. Provides training to employees to perform job functions

_____ is a type of data encryption that enables Internet users to securely and privately exchange data through a pair of keys obtained from a trusted authority and shared through that authority. a. Public key infrastructure b. A private key infrastructure c. Open key encryption d. Secret key encryption

a. Public key infrastructure

The human resources department emailed all the interns instructing them to access the company portal and provide their social security numbers. What would be an example of poor security practices for an intern to do in response to this email? a. Select "reply all" and provide their social security number in the email. b. Follow the instructions and click the button to use the portal to complete the needed information. c. Follow the instructions and click "reply all" to let everyone know you completed the task. d. Right-click on the link in the email and inspect the URL to verify it is not malicious.

a. Select "reply all" and provide their social security number in the email.

A company's CEO hires a new security analyst to determine why a certain employee has suddenly experienced issues with the employee's application development skills. The only thing that has changed is that the employee has recently been assigned to mentor a new employee. After further research, the security analyst notices the new employee logging into the mentor's account when the mentor is away. Which one of the following should the analyst pursue as the issue? a. social engineering b. voice recognition c. weblogging d. disk mirroring

a. social engineering

Compared with a flat file system, _____ in a database. a. storage space is reduced b. programs and data are interdependent c. complex requests cannot be handled easily d. data redundancy is introduced

a. storage space is reduced

How can internet technologies help universities to face enrollment declines? a. Providing less paperwork to enroll. b. Allowing universities to provide online degrees. c. Providing mobile applications that track students' progress. d. Replacing all courses with MOOCs

b. Allowing universities to provide online degrees.

When considering Power BI, which would not be considered an advantage? a. Seamless integration with other data and existing applications b. Analytics may be misinterpreted and offer support for a decision that may not be ethical c. Creation of personalized dashboards for different users with diverse information needs d. Delivery of actionable information with high speed, accuracy, and security

b. Analytics may be misinterpreted and offer support for a decision that may not be ethical

The manager wants to inform all its employees that the meeting room will be closed due to electric problems and that they can use the secondary meeting room. Which medium will be more appropriate? a. Newsgroups b. E-Mail c. Discussion Group d. Letter

b. E-Mail

What is the advantage of using EAP over WEP? a. EAP uses fixed keys instead of dynamically generated ones. b. EAP uses dynamically generated instead of fixed keys. c. EAP uses a master key to negotiate a session key. d. EAP hides the SSID from non-authorized users.

b. EAP uses dynamically generated instead of fixed keys.

As a knowledge worker, it is unnecessary to check if the decision complies with the organization's values while making a work-related decision. a. True b. False

b. False

Client-based e-mail enables users to access their e-mail accounts from any computer. a. True b. False

b. False

Combinations of spaces and special characters can be used in domain names of uniform resource locators (URLs). a. True b. False

b. False

Consolidating information from different departments or functional areas is easier in data marts than in a data warehouse. a. True b. False

b. False

Conventional computing methods are able to efficiently process and manage big data. a. True b. False

b. False

Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions. a. True b. False

b. False

Distributed processing maintains decentralized control and centralized operations. a. True b. False

b. False

Fourth-generation languages (4GLs) are also called procedural languages. a. True b. False

b. False

Level 1 security protects back-end systems to ensure data confidentiality, accuracy, and integrity. a. True b. False

b. False

One of the ways green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings. a. True b. False

b. False

Sniffers don't pose a risk to wireless network traffic. a. True b. False

b. False

In object-oriented programming, which statement describes a class? a. It uses a series of short codes to represent data or instructions. b. It defines the format of an object. c. It controls and prioritizes tasks performed by the CPU. d. An item that contains data and the procedures that read and manipulate it.

b. It defines the format of an object.

What is a characteristic of information technology? a. It has reduced consumers' purchasing power. b. It has cut down production costs. c. It has eliminated more jobs than it has created. d. It has increased clerical jobs.

b. It has cut down production costs.

A security analyst wants to control access to the server room and network equipment and include locking mechanisms for securing computers and peripherals from theft. How would this type of security measure be classified? a. Virtual security measures b. Physical security measures c. Biometric security measures d. Nonbiometric security measures

b. Physical security measures

Why is bulk email still a popular method for businesses to reach customers? a. Spam can be used to track how customers respond to emails. b. Spam email is an inexpensive way to reach large audiences. c. Spam can be used to manage customer relationships. d. Spam email is well received by its audience.

b. Spam email is an inexpensive way to reach large audiences.

A CFO of an online marketplace is not convinced of the cost/benefit of a security system upgrade to help prevent ransomware attacks. The security analyst's most convincing argument is _____. a. The customers will not trust the online website b. The company may pay millions in recovery costs c. The company will lose employees after a hack d. The security upgrade will improve the online marketplace

b. The company may pay millions in recovery costs

Why would an organization decide to hire a CISO? a. To combat high wages of network admins b. To combat the increasing number of security breaches c. To establish better internet protocols d. To reduce the load from the CIO

b. To combat the increasing number of security breaches

A brick-and-mortar business has seen a recent spike in traffic on static websites. How would you advise the business to take advantage of this traffic? a. Identify the traffic source and target that demographic in your marketing b. Transform it into an e-commerce site and offer online shopping c. Redirect visitors to shop in person d. Increase ad spending on the website

b. Transform it into an e-commerce site and offer online shopping

Choose the statement below that best illustrates a big data privacy risk. a. Since big data is only available on mobile devices, security is more easily compromised. b. Using big data could provide more than a sales manager needs and hamper decision-making. c. Big data analytics could give a banker a reason to approve or decline a potential client's load application. d. The IT staff responsible for collecting the data could easily compromise or lose large amounts of data.

c. Big data analytics could give a banker a reason to approve or decline a potential client's load application.

How does access to the Internet impact customers' buying decisions? a. Customers are overwhelmed with decisions and make the first choice they see. b. Customers now need to provide their information before searching for items online. c. Customers now have access to various data to make more informed decisions. d. Customers can no longer choose without concern about ramifications from another company.

c. Customers now have access to various data to make more informed decisions.

Comprehensive security measures must ensure that access to an organization's _______ is granted only to authorized users and trusted business partners. a. Intranets b. LAN c. Extranets d. Internet

c. Extranets

_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Internet Protocol d. Extensible Authentication Protocol

c. Internet Protocol

A program relates to a computer in which of the following ways? a. It tells the computer how to transfer data from one networked device to another. b. It identifies whether the computer acts as a client or a server. c. It provides step-by-step directions for performing a specific task in a language the computer can understand. d. It establishes the correct language in which the system unit relates to peripheral devices.

c. It provides step-by-step directions for performing a specific task in a language the computer can understand.

What is the advantage of natural language processing? a. Makes technologies easier to use with written orders b. Makes technologies easier to use with visual controls c. Makes technologies easier to use with verbal commands d. It makes technologies easier to use with telepathic commands

c. Makes technologies easier to use with verbal commands

The CIO is making the case the present to the board to transition from on-premises server infrastructure to the cloud. What is the environmental benefit of this approach? a. Cloud provider will manage the green disposal of on-prem equipment. b. Greater energy consumption to provide more reliable business continuity. c. Reduced energy consumption for lower energy bills and maintenance. d. Reduces personnel needed and using facilities.

c. Reduced energy consumption for lower energy bills and maintenance.

The system administrator is noticing a great increase in the size of certain programs running on the system. What should be the administrator's next step? a. Increase the memory in the system b. run system updates. c. Run an antivirus program d. Increase the system's disk space

c. Run an antivirus program

A computer company experienced a massive job loss in a manufacturing facility after a security breach occurred a few months prior. Which result could be the cause of this issue? a. Lost trust. b. Stolen employee identities. c. Stolen trade secrets. d. Lost confidence.

c. Stolen trade secrets.

In a relational database model, how can one table be cross-referenced to another table so that data can be retrieved from both tables? a. The tables must have foreign key columns that match. b. The tables must have primary key columns that match. c. The primary key column of one table must match the foreign key column of the other table. d. The tables must have the same name and primary key columns that match.

c. The primary key column of one table must match the foreign key column of the other table.

Which of the following is a major concern for a company while using big data analytics? a. Big data is stored in the cloud which, is always accessible to everyone. b. Too much data makes it difficult to summarize and aggregate data. c. There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics. d. The servers on which big data is stored are not always housed in secure environments.

c. There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics.

Microsoft Outlook is an example of a ________. a. Web-based e-mail program b. crawler-based e-mail program c. client-based e-mail program d. bot-based e-mail program

c. client-based e-mail program

In the context of green computing, properly recycling an unwanted digital device is considered _______. a. green use b. green manufacturing c. green disposal d. green design

c. green disposal

A data _____ is usually a smaller version of a data warehouse used by a single department or function. a. dictionary b. domain c. mart d. mine

c. mart

A(n) _____ is a device that connects a user to the Internet. a. drafter b. cookie c. modem d. applet

c. modem

When contrasting a network model and a hierarchical model, the main difference is that a record in a network model can have: a. one parent record, but many child records. b. a parent record, but no child records. c. multiple parent and child records. d. a parent and a child record.

c. multiple parent and child records.

What do Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on as the communication medium? a. multiplexer b. controller c. radio frequency spectrum d. CIA triangle

c. radio frequency spectrum

Why should a small organization invest in learning about NLP? a. As NLP becomes widely adopted, extranets will rely on the technology to communicate with other companies. b. As NLP becomes widely adopted, compliance measures will force organizations to use this technology. c. As NLP becomes widely adopted, industries will require it to work with it as a partner organization d. As NLP becomes more widely adopted, organizations will need to respond to users who want to use this technology.

d. As NLP becomes more widely adopted, organizations will need to respond to users who want to use this technology.

Which statement is true of Voice over Internet Protocol (VoIP)? a. Users often experience busy lines. b. Users cannot forward calls. c. Voicemails are not received on the computer. d. Callers can be screened even with blocked caller IDs.

d. Callers can be screened even with blocked caller IDs.

It's your birthday! You received an email from your company's HR director for a $100 Amazon gift card. What would be the appropriate action in response to this email? a. Forward the email to your personal email for you to look at later after work. b. Click on the link and log in to your Amazon account to buy something. c. Forward the email to your supervisor asking if HR started sending birthday gift cards. d. Do not click on anything but forward it to your IT team and HR director with your suspicions of a phishing attack.

d. Do not click on anything but forward it to your IT team and HR director with your suspicions of a phishing attack.

A security analyst has just received an email that their hospital data has been stolen. How can the company best spend its money to help prevent this from happening in the future? a. Put money aside to pay for future hacks. b. Pay for a new firewall to protect the servers. c. Pay for redundant servers. d. Hire a security specialist to educate employees.

d. Hire a security specialist to educate employees.

Which of the following is considered a feature of Tableau? a. Allocation b. Encapsulation c. Translating coded values, such as replacing Yes with 1 d. In-depth insights and "what-if" analysis

d. In-depth insights and "what-if" analysis

What is a potential benefit of telecommuting? a. It regulates work routines. b. It separates work and home life. c. It increases the interaction with coworkers. d. It increases productivity.

d. It increases productivity.

A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model's _____ layers. a. Presentation and Application b. Session and Presentation c. Network and Transport d. Physical and Data Link

d. Physical and Data Link

Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which will help Joey promote his products? a. WordPress b. Bing c. SoundHound d. Pinterest

d. Pinterest

Which statement differentiates between read-only memory (ROM) and random access memory (RAM)? a. ROM is secondary memory, whereas RAM is main memory. b. ROM is main memory, whereas RAM is secondary memory. c. ROM is volatile memory, whereas RAM is nonvolatile memory. d. ROM is nonvolatile memory, whereas RAM is volatile memory.

d. ROM is nonvolatile memory, whereas RAM is volatile memory.

In data encryption, the HTTPS in a browser address bar indicates a safe HTTP connection over _____. a. Transport Layer Security b. User Datagram Protocol c. Transmission Control Protocol d. Secure Sockets Layer

d. Secure Sockets Layer

Considering the data types in a database, which would be classified as a source of external data? a. Personnel records b. Sales records c. Transaction records d. Tax records

d. Tax records

Which describes a memory device? a. The contents of random access memory cannot be reprogrammed. b. The contents of flash memory cannot be reprogrammed. c. The contents of cache random access memory cannot be reprogrammed. d. The contents of programmable read-only memory cannot be reprogrammed.

d. The contents of programmable read-only memory cannot be reprogrammed.

Which of the following is a disadvantage of MOOCs? a. It is only of interest to people in remote areas. b. MOOCs raise the cost of providing education. c. The certifications are inferior to the on-campus ones. d. They don't have the personal touch of a campus.

d. They don't have the personal touch of a campus.

A publishing company has several writers, each writing a different book chapter. Each writer uses their computer to write the manuscript later; an editor compiles the chapters and checks the coherence of the book. This is an example of a ________. a. interconnected model b. distributed processing c. centralized processing d. decentralized processing

d. decentralized processing

A DSL requires a modem because: a. the cable that transmits TV needs a way to translate the signals to a computer. b. it increases the speed even when the computer is not close to the provider. c. the DSL provider requires the use of modems to follow their communication standards. d. it uses a medium for analog signals to connect to a digital device.

d. it uses a medium for analog signals to connect to a digital device.

The CSIS (Center for Strategic and International Studies) issued a report that went further than the research from Cybersecurity Ventures regarding cybercrime costs; it included: a. identity theft b. loss of trade secrets c. intellectual property d. job losses

d. job losses

Albert applied for a consumer durables loan at Horizon Bank and had to provide his personal information in the loan application form. John, the banker in charge, used Albert's information to sell him a credit card issued by Horizon Bank. In this scenario, John's action is considered _____. a. criminal but ethical b. illegal and unethical c. legal and ethical d. legal but unethical

d. legal but unethical

A network administrator notices data loss and change in the size of files that seems to co-occur on Thursdays. This issue would be classified as a ________. a. trojan program b. worm c. backdoor d. virus

d. virus

A user has noticed unexpected disk activity at random intervals even though the user is not trying to save or open a file. The system administrator has determined it must be a _____ causing the activity. a. rootkit b. trojan c. worm d. virus

d. virus


Ensembles d'études connexes

Systems Development Chapter 11 Systems Analysis and Design

View Set

Customer Service: Empathy Unit 2

View Set

chap 28 shock and multiple organ dysfunction syndrome

View Set