ISYS 2 EXAM

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In the URL: Which indicates the directory name? a. large.html b. clients c. Http d. www.wdc.com

B

Why could a high-voltage transformer be a problem for a nearby wireless network? a. It might cause power surges. b. It produces radio waves. c. It creates a safety hazard. d. It is a source of noise for users.

B

__ holds data when the computer is off. a. Read-only memory b. Secondary memory c. Programmable read-only memory d. Random access memory

B

In computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or unauthorized changes to a corporate database. a. confidentiality b. integrity c. availability d. validity

BC

If a program does not require separate documentation, it is written in what language? a. SQL b. Assembler c. JavaScript d. machine language

C

In a typical intranet configuration, the ___________ must define each user's level of access. a. Human Resources Department b. sysop c. system administrator d. DBMS

C

The next technology predicted after the Internet of Things is the _____. a. Internet of Everything b. Smart Internet c. Internet of Me d. Internet of Us

C

What is the impact of IoT devices on businesses? a. They are used to track personnel and devices. b. They are used to monitor work being performed. c. They can increase productivity and decrease costs. d. They can decrease productivity and increase labor costs.

C

Which statement best compares how a business can use information with and without a visualization tool? a. Using graphs allows a user to quickly and easily visualize summarized data. Without graphs, users must read through numeric data, which takes longer. b. Using graphs slows down the decision-making process by delaying access to data. Without graphs, users have immediate access to data. c. Using graphs allows a user to quickly and easily visualize detailed data. Without graphs, users must read through numeric data, which takes longer. d. Using graphs is an advantage for users when a small amount of data is needed. Without graphs, users can access large amounts of data easily.

C

___ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems. a. Feasibility prototypes b. Biometric systems c. Genetic algorithms d. Quick response codes

C

_____ find the combination of inputs that generates the most desirable outputs, such as the stock portfolio with the highest return. a. natural-language processing b. speech systems c. genetic algorithms d. biometric systems

C

Identify a social networking site based in Ghana. a. M-Pesa b. FrogTek c. Facebook d. Esoko

D

Copyright laws cover online materials that can be printed or saved on a storage device. a. True b. False

True

Information technologies have led to job deskilling. a. True b. False

True

Voice over Internet Protocol (VoIP) routes traffic starting and ending at conventional public switched telephone network phones. a. True b. False

True

A(n) _____ is a common output device for hard copy. a. compact disc b. optical character reader c. laser printer d. plasma display

c) laser printer

_____ make it possible for Web sites to customize pages for users, such as an e-commerce Web site recommending items based on your past purchases. a. Kernels b. Applets c. Trojans d. Cookies

d) cookies

A computer company experienced a massive job loss in a manufacturing facility after a security breach occurred a few months prior. Which result could be the cause of this issue? a. Stolen trade secrets. b. Stolen employee identities. c. Lost trust. d. Lost confidence.

A.

You are a new town business with some competition from established businesses. How can technology help you bring customers in based on costs? a. Identify cheaper ways of doing business or suppliers b. Establish a relationship with a supplier who will offer you a steep discount. c. Sell products at a higher rate for online sales than in-person transactions. d. Use Google's search engine model to help lower costs.

A.

A _____ is about the size of a credit card and contains an embedded microprocessor chip for storing important financial and personal information. a. memory card b. smart card c. pay card d. nano card

B

A developer has noticed a lot of internal scope creep during the development of a database-driven timesheet web application. What can the developer do to limit the scope? a. Use the SDLC approach to make sure the design follows the specification. b. Use the agile approach and come up with a minimal list of requirements. c. Use the SDLC approach to make sure the specification is minimal. d. Use the agile approach and come up with a complete list of requirements.

B

A global information system (GIS) can be defined along two dimensions: customization and communication. a. True b. False

B

Green computing can be achieved by: a. replacing meetings over computer networks with actual face-to-face meetings. b. using video conferencing, electronic meeting systems, and groupware. c. using non-biodegradable computing devices. d. replacing one large server with several underutilized smaller servers.

B

How does the lack of high-speed Internet impact the economic development of a rural community? a. There is no discernable economic difference between rural and urban areas. b. It deters organizations and employers from moving and opening places of business in the area. c. It entices organizations and employers to move into the area. d. It encourages entrepreneurship.

B

In the context of Internet services, what is Internet telephony's drawback? a. Voicemails cannot be received on the computer. b. The call quality is not as good as regular phone lines. c. Users often experience busy lines. d. Users cannot forward calls.

B

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. a. mirror disk b. blended threat c. firewall d. backdoor threat

B

One of the disadvantages of an e-marketplace is that it cannot provide a single platform for prices. a. True b. False

B

One of the issues with a global information system is that too much _____ can decrease an organization's flexibility in responding to local preferences-even time differences. a. localization b. standardization c. regionalization d. customization

B

Spoofing happens when: a. a firewall rejects the incoming data packets. b. an illegitimate program poses as a legitimate one. c. a word is converted into a digital pattern. d. keystrokes are monitored and recorded.

B

The CIO is reviewing a report of the log activity and has noticed that approximately 75% of the personnel stay logged in to their office computers during the weekend. The office is not open on the weekends, and while some work on the weekends - it is not 75%. You suspect the reason is that employees are not logging out of the system as they are in a hurry to start the weekend. What would be the appropriate step to address this security concern? a. Install the software on the network that will cause the computer to lock out if no activity is detected for 30 seconds. b. Provide training on security best practices - that includes logging out. c. Keep track of the users who are not logging out and prepare a report to provide to the administration. d. Ignore it because no one is in the office.

B

Which describes fifth-generation languages (5GLs)? a. They contain a series of 0s and 1s representing data or instructions. b. They use artificial intelligence technologies, such as knowledge-based systems. c. They are the easiest computer languages to use. d. They are machine dependent and need to be changed after every use.

B

Which statement is true of an intranet? a. It aids the duplication and distribution of documents. b. It helps organizations move from a calendar-based document-publishing strategy to one based on events. c. It inhibits sharing software, such as an office suite or a database management system. d. It increases the costs and time of document production

B

To minimize the invasion of privacy, organizations should: a. not delete data even when it is not needed. b. collect only the data that is necessary for the stated purpose. c. provide unlimited access to personal information to those who have authorization. d. not modify data once it is entered into an information system

B.

A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners to make communication between organizations possible. a. token ring b. local talk c. extranet d. newsgroup

C

Business analytics uses _____ to gain insight into data and provide decision-makers with the information they can act on. a. dashboards b. query reports c. predictive modeling d. application generators

C

During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. a. implementation b. planning c. maintenance d. design

C

From the manager's point of view, virtual meetings are considered ____________ applications of data communication systems since they allow remote collaboration reducing transportation costs. a. virtually-secure b. creative c. cost-effective d. groundbreaking

C

Identify the type of computer that has the highest storage capability. a. Notebooks b. Subnotebooks c. Supercomputers d. Personal computers

C

In supply chain management (SCM) related to manufacturing, which of the following is considered a key decision about inventory? a. What should be produced? b. Where should the manufacturing facilities be located? c. How much should be ordered? d. Which transportation systems will reduce cost?

C

The ability to create personalized dashboards in Power BI best demonstrates which of its features? a. A database designer can use diagramming to visualize the final design. b. Data can be captured from several different sources and summarized. c. Different users can use Power BI to suit their individual and unique needs. d. Data is delivered at high speeds with great accuracy.

C

Which of the following is a major concern for a company while using big data analytics? a. Big data is stored in the cloud which, is always accessible to everyone. b. Too much data makes it difficult to summarize and aggregate data. c. There are, to date, few (if any) legal requirements for protecting privacy while using big data analytics. d. The servers on which big data is stored are not always housed in secure environments.

C

Which of the following should be included in a comprehensive security plan? a. Install only open-source software from reputable sites. b. Limit computer access to specific times only. c. Install antivirus programs and make sure they are updated automatically. d. Encourage the use of easily remembered passwords

C

A COO is preparing budgets for each department in the company. A part of this activity is based on intuition and experience, and another part is calculating percentages of available funds for each department. How would this decision be classified? a. Structured b. Unstructured c. Pseudostructured d. Semistructured

D

A buyer receives a $20,000 monthly budget for purchasing lumber at a home improvement store. The buyer needs to calculate the cost of the lumber, shipping costs, and the price so the store can still make a profit. This is known as _____ analysis. a. Exception reporting b. Sensitivity c. Goal seeking d. Optimization

D

A student at a university has been receiving calls about issues with a bank account. To remedy the issue, the student needs to give the caller their social security number and banking information. The student wisely contacts the bank directly where it is classified as a _____ issue. a. pharming b. baiting c. phishing d. vishing

D

Accepting human language as input, carrying out the corresponding command, and generating the necessary output are all part of _____. a. knowledge acquisition b. natural-language-processing c. database management d. interfacing

D

Common applications of convergence do not include which of the following? a. Telecommuting b. Increased affordability of computer conferencing c. E-commerce d. Decreased availability of videos on demand

D

How is an ATM an example of TPS? a. ATM completes automated tasks much slower and carefully. b. ATMs use biometric information to confirm a person's identity. c. TPS is used to disburse funds after the teller authorizes it. d. TPS is used to authenticate users, verify funds, perform the requested action, and update accounts, if necessary, without the human intervention of a teller.

D

Hypersocial organizations should forget information channels and concentrate on: a. reviews. b. e-commerce. c. knowledge networks. d. social media.

D

In a customer relationship management (CRM) system, which strategy illustrates its focus? a. abiding by government regulations b. organizing contacts with business partners c. transactions with new customers, d. long-term relationships with customers

D

Jackie knows how to use word processors, spreadsheets, and presentation software. They also have a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jackie has _____ literacy. a. network b. business c. information d. computer

D

Microsoft SQL Server is an example of ____ software. a. presentation b. word processing c. spreadsheet d. database

D

To which scenario would predictive business analytics best be applied? a. A sales department is looking at various future pricing possibilities to compare the ramifications of each. b. A manufacturer looks at past years' inventory numbers to view trends. c. The marketing department would like to produce a list of current customers sorted by state. d. A company would like to budget for new employees in its five-year plan.

D

Which of the following has helped to overcome difficulties with typing on handheld devices? a. Knowledge Graph b. Google Keep c. Web Crawlers d. Google Voice Search

D

Why does an information system use data and not information? a. Information excludes external data sources. b. Information is raw facts that are not organized into the system. c. Data excludes external data sources. d. Data is raw facts that are inputted into the system.

D

Social networking sites can reduce organizations' costs by _____. a. limiting buyers' choices by offering services that make it difficult for customers to switch, b. providing an inexpensive medium for targeting a large customer base. c. customizing the organization's website and offering many options to customers d. giving customers more access to all sorts of organizational information

b) providing an inexpensive medium for targeting a large customer base

_____ refers to using a cellular phone outside a carrier's limited service area. a. Surfing b. Roaming c. Teleprocessing d. Routing

b) roaming

A manager wants to create a webpage displaying the best employee of the month. Which is the most appropriate place to publish such a webpage? a. The Internet. b. The company's intranet. c. Each employee's social network site. d. The company's LAN.

b) the company's intranet

The organization is growing, adding a group of summer interns to its team. The organization's attorney has suggested adding an Internet use policy to their handbook and requiring all employees and interns to agree and sign the updated terms. Why is this necessary? a. To protect the users from risks associated with their coworkers completing unauthorized downloads on organization property or network. b. To protect the organization from risks associated with employees/interns completing unauthorized downloads on organization property or network. c. To protect ISPs from risks associated with an organization completing unauthorized downloads using the Internet. d. To protect the customers from risks associated with their company employees completing unauthorized downloads on organization property or network.

b) to protect the organization from risks associated with employees/interns completing unauthorized downloads on organization property or network.

Which of the following is not considered a way to achieve green computing? a. Use computing devices that consume less energy. b. Encourage carpooling and nonmotorized transportation for employees. c. Encourage all employees to work on-site. d. Design search engines and other faster computing routines and consume less energy.

c) Encourage all employees to work on-site

How does a database help an organization make decisions? a. Databases include transaction-processing reports for data analysis. b. Databases are written for specific data applications. c. Databases are used to create, organize, and manage data which can be used for strategies. d. Databases can be used as POS transactions to improve databases' routing and delivery schedules.

c) databases are used to create, organize, and manage data which can be used for strategies.

When you enter a search term in a search engine, where is the information retrieved from? a. Crawled-base directory b. Web crawler c. Indexes d. Human-powered directory

c) indexes

Which best defines an operating system (OS)? a. It is a computer and all the software for managing network resources and offering services to a network. b. It is a collection of disk drives used for fault tolerance and is typically found in large network systems. c. It is a set of programs for controlling and managing computer hardware and software. d. It is the main circuit board containing connectors for attaching additional boards.

c) it is set of programs for controlling and managing computer hardware and software.

Internet protocol IP operates at the network layer because: a. it is the protocol used by nodes. b. it is the way nodes communicate in the network. c. it uses IP addresses to route packets. d. IP is the identifier in the network.

c) it uses IP addresses to route packets

A register machine that sends all the sales information to a central server that stores all the data is an example of ___________. a. minicomputer b. thin client c. smart terminal d. mini smartphone

c) smart terminal

Which statement best describes spyware? a. It is encryption security that manages transmission security on the Internet. b. It is an attack that floods a server with service requests to prevent legitimate users' access to the system. c. It is software that secretly gathers information about users while they browse the Web. d. It is a programming routine built into a system by its designer to bypass system security and sneak back into the system later to access programs or files.

c.

A storm has taken down the electrical grid, but the system is recovered in a matter of seconds afterward. Which term best represents the usability of the computers on the network after recovery? a. confidentiality b. validity c. integrity d. availability

d) availability

A comprehensive framework called the ____ was created by Harvard Business School's Michael Porter for analyzing an organization, its position in the marketplace, and how information systems could be used to make the organization more competitive. a. Four Resources Model b. Six Sigma Model c. Three Pyramid Model d. Five Forces Model

d) five forces model

Which statement is true of big data? a. It can be efficiently processed and managed by conventional computing methods. b. It has three dimensions: value, density, and uniformity. c. It eliminates unethical actions based on interpretations. d. It is the result of the exponential growth of data in both public and private organizations.

d) it is the result of the exponential growth of data in both public and private organizations.

Which statement demonstrates a characteristic of a high-quality inkjet printer? a. Its output for a mainframe computer is called soft copy. b. It is suitable for office environments that have high-volume and high-quality printing requirements. c. It uses laser-based technology that creates electrical charges on a rotating drum to attract toner. d. It uses multicolor ink cartridges to print digital photographs

d) it uses multicolor ink cartridges to print digital photographs

In a relational database model, how can one table be cross-referenced to another table so that data can be retrieved from both tables? a. The tables must have foreign key columns that match. b. The tables must have the same name and primary key columns that match. c. The tables must have primary key columns that match. d. The primary key column of one table must match the foreign key column of the other table.

d) the primary key column of one table must match the foreign key column of the other table

A manager wants to have a private, real-time channel of Internet-based communication with their employees. Which of the following is more appropriate? a. Instant Messaging b. E-Mail c. Discussion Group d. Newsgroups

instant messaging

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails. a. True b. False

b) false

An online bank has just been hacked, and the hacker has accessed customer accounts. This could be characterized as a failure of _______. a. availability b. integrity c. confidentiality d. reliability

b) integrity

A business analyst wants to track customer interactions. Which tool should the analyst use? a. automated customer service b. eCRM c. salesforce automation d. survey management

A

A small e-commerce business is looking to upgrade its computer equipment. They want this upgrade to last for at least ten years. Why would quantum computing not be an appropriate solution? a. Quantum computing is for specific high-calculations and is not needed for a small eCommerce shop. b. Quantum computing is stateless and will not process sales. c. Quantum computing is for large eCommerce organizations. d. Quantum computing is stateful and cannot update inventory databases.

A

An English major creates a website where users can contribute after reading one part of a short story written by the student. They can vote on how the story evolves if they decide to contribute. What category of social commerce best fits this business? a. Participatory e-commerce b. Group buying platform c. Social advice d. Social networking

A

Blockchain has become one of the most secure technologies for transactions. What feature supports this security? a. The inability to track transactions. b. The ability to track transactions. c. The inability to alter transactions after they are recorded. d. The ability to alter transactions after they are recorded.

A

Bluetooth can be used to create a ________________(PAN). a. Personal area network b. Private area network c. Positive association number d. Personal activation network

A

Business intelligence (BI) uses scorecards and dashboards to support decision-making activities, whereas business analytics (BA) uses data mining tools and predictive modeling. a. True b. False

A

In the context of fuzzy logic, which defines membership in a black-or-white fashion? a. A crisp set b. A dynamic set c. A coded set d. A mutable set

A

Nanotechnology may eventually replace current microprocessors. a. False b. True

A

Second-generation computers used _____. a. transistors b. vacuum tube technology c. integrated circuits d. laser technology

A

Subscribers on a mobile network are limited to the network coverage area. Roaming can be used to __________. a. Extend the subscribers' coverage area outside of the original network. b. Keep track of subscribers' activity outside the network coverage area. c. Register a new service outside of the original mobile network area. d. Restrict the subscribers' coverage to the network coverage area.

A

The ROOF organization comprises several contractors operating in different countries. The headquarters are in charge of providing the funding to complete constructions that are decided locally. Which is a more appropriate classification for the ROOF organization? a. Multinational Organization b. Transnational Organization c. International Organization d. Global Organization

A

The designers of a management support system (MSS) just released the system to top management. The system is operational but one of the features is clearly not what the management expected. What could be the cause of this problem? a. The system's objectives should be defined clearly. b. The system was developed in an agile way. c. The system's specification was missing. d. The system should have been demonstrated with a prototype.

A

Which is the major disadvantage of a request for proposal (RFP)? a. A lengthy time frame for preparation makes an RFP less appealing. b. In an RFP, every vendor gets different information, resulting in unfair bids. c. In an RFP, different vendors have different deadlines for submitting bids. d. The limited time allotted for the evaluation of an RFP makes the process tedious.

A

Which text form needs to be unscrambled using a decryption key? a. Ciphertext b. Cleartext c. Plaintext d. Teletext

A

_____ computing refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals. a. Context-aware b. Cloud c. Ubiquitous d. Pervasive

A

A patent protects product names and identifying marks. a. True b. False

False

As a knowledge worker, it is unnecessary to check if the decision complies with the organization's values while making a work-related decision. a. True b. False

False

In the context of business analytics, mobile analytics is declining in popularity. a. True b. False

False

In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP). a. True b. False

False

In analyzing the components of a successful marketing campaign, which of the following is not a key factor? a. Design new and innovative products. b. Segment customers by demographics, geography, and other criteria. c. Build customer loyalty. d. Analyze profitability.

a) design new and innovative products

Compared to campus-based learning, MOOCs offer __________. a. lower prices and greater flexibility b. higher costs per course c. a more personal touch d. face-to-face interaction

a) lower prices and greater flexibility

____ is an attempt to gain access to a network by posing as an authorized user to find sensitive information, such as passwords and credit card information. a. Spoofing b. Pharming c. Keystroke logging d. Phishing

a) spoofing

Which of the following activities demonstrates the use of Online analytical processing tools? a. Testing data access to ensure security protocols are met b. "Drilling up" proceeding from the smallest unit of data to higher levels c. Mixing data from multiple sources d. Extracting data from a spreadsheet and porting it to the data warehouse

b) "drilling up" proceeding from the smallest unit of data to higher levels.

A patent protects product names and identifying marks. a. True b. False

b) false


संबंधित स्टडी सेट्स

It's Your Paycheck Lesson 6 Test

View Set

Lippincott and Saunders Psych questions

View Set

Salesforce Certified Business analyst exam

View Set

Fundamentals of Nursing Course Point Quiz- CH. 4

View Set

The Respiratory System - Chapter 21-5 Enclosed by a pleural membrane, the lungs are paired organs containing alveoli, which permit gaseous exchange - Bronchial Tree

View Set

Ethics and Legal Issues in School Counseling Final Exam

View Set