IST 202 exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

1) Which of the following tasks is performed by application software? A) printing documents B) writing a business letter C) presenting information via a monitor D) updating the system clock E) saving data to a disk

b

3) With respect to the five general classes of computers, ________ are typically used for mission critical applications, such as transaction processing. A) workstations B) supercomputers C) servers D) mainframes E) personal computers

d

6) With respect to the general classes of computers, a ________ is very large and is used primarily as the main, central computing system for major corporations. A) personal computer B) supercomputer C) server D) mainframe E) workstation

d

4) Which of the following is a difference between a server and a workstation? A) A workstation has fast network connectivity in comparison with a server. B) A workstation is used primarily as the main, central computing system for major corporations. C) A workstation has high reliability in comparison with a server. D) A workstation has more memory and more disk storage in comparison with a server. E) A workstation is typically used by one user at a time.

e

A ________ is any computer that may both request and provide services. A) console B) client C) peer D) host E) port

C

Which of the following differentiates grid computing from cloud computing? A) Grid computing uses a large number of computers. B) Grid computing is a natural evolution of the widespread adoption of virtualization and utility computing. C) Grid computing is applied to a single large problem. D) Grid computing involves over-the-Internet provision of dynamically scalable and often virtualized resources. E) Grid computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.

C

Which of the following features of the Web contains not only information but also references or links to other documents? A) proxy server B) Web ring C) hypertext D) codec E) domain name

C

Which of the following statements is true about companies pursuing a click-only business strategy? A) These companies approach business activities by operating physical locations. B) These companies operate in both physical and virtual arenas. C) These companies conduct business electronically in cyberspace. D) These companies are only involved in export business activities. E) These companies choose to operate their business activities solely in the traditional manner.

C

________ define the procedures that different computers follow when they transmit and receive data. A) Consoles B) Keyloggers C) Protocols D) Hosts E) Hypertexts

C

________ is used to increase Web application performance. A) Trusted computing B) Distributed computing C) Edge computing D) IP convergence E) Green computing

C

With regard to the World Wide Web, Web pages are stored on ________. A) Web consoles B) Web rings C) Web consortiums D) Web servers E) Web hosts

D

IP cannot be used to transmit video data.

F

Using a utility computing model, cloud computing helps to transform IT infrastructure costs from a capital expenditure to an operational expenditure.

T

5) With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems. A) supercomputer B) workstation C) mainframe D) server E) personal computer

a

2) A fundamental component of the IS infrastructure is the ________, that is, the computers that run the applications and databases necessary for processing transactions or analyzing business data. A) protocol B) archival storage C) hardware D) system software E) data center

c

Electronic commerce is used to conduct business with professional partners such as suppliers and intermediaries. This form of EC is commonly referred to as ________ electronic commerce. A) business-to-consumer B) peer-to-peer C) business-to-business D) business-to-intermediary E) business-to-supplier

c

17) Without middlemen like Travelocity.com, Orbitz.com, and other travel Web sites, a consumer would have to check all airline Web sites in order to find the flight with the best connection or lowest price. This introduction of middlemen in business models is an example of ________. A) reintermediation B) remutualization C) gentrification D) disintermediation E) defalcation

A

8) Which of the following statements is true about servers? A) They are used to provide services to users within large organizations or to Web users. B) They are primarily used as the main, central computing system for major corporations. C) They are used primarily to assist in solving massive scientific problems. D) They are optimized for visualization and rendering of three-dimensional models. E) They are used for personal computing and small business computing.

A

A hypertext document is otherwise known as a ________. A) Web page B) Web host C) Web ring D) Webmaster E) Web consortium

A

Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay.com. B) Ben files an online suit against Sony. C) Ben files a complaint on Sony's Web site asking for an escalation. D) Ben buys a Canon G 12 from Sony's online store. E) Ben sells the Olympus E-PL2 to the world's largest used camera dealer KEH.com.

A

Data centers managed by a third party that rents out space to multiple organizational customers are known as ________. A) collocation facilities B) multi-bay stations C) serial port facilities D) data ease facilities E) datahub stations

A

ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments includes the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS? A) grid computing B) green computing C) trusted computing D) edge computing E) IP convergence

A

The operating system of a computer is an example of ________ software. A) systems B) open source C) transitory D) peripheral E) application

A

The protocol used by the Internet is called the ________. A) Transmission Control Protocol (TCP) B) Dynamic Host Configuration Protocol (DHCP) C) Address Resolution Protocol (ARP) D) Trivial File Transfer Protocol (TFTP) E) TOC protocol

A

Web servers process user requests for pages using the ________. A) Hypertext Transfer Protocol B) TOC Protocol C) Address Resolution Protocol D) Dynamic Host Configuration Protocol E) Trivial File Transfer Protocol

A

Which of the following actions explains mass customization? A) Firms tailor their products and services to meet a customer's particular needs on a large scale. B) Firms provide immediate communication and feedback to and from customers. C) Firms provide ways for clients and firms to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information.

A

Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth? A) personal area network B) storage area network C) campus area network D) metropolitan area network E) body sensor network

A

Which of the following is likely to have the suffix ".org" after the domain name in its URL? A) The Red Cross Society B) Starbucks C) The Federal Bureau of Investigation D) McDonalds E) Harvard Business School

A

Which of the following is the host name in the URL "labs.google.co.in/jack carver"? A) labs B) google C) co D) in E) jack carver

A

Which of the following statements is true about electronic commerce? A) Business-to-business is by far the largest form of electronic commerce in terms of revenues. B) Electronic commerce is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is impossible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce.

A

Which of the following statements is true about the infrastructure as a service model? A) The customer has to manage the licenses for the operating systems being used. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer does not have to manage operating system licenses. E) The user has control over the applications but has limited or no control over the underlying infrastructure.

A

Which of the following statements is true about the software as a service model? A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. B) The customer has to manage the licenses for the operating systems being used. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer is provided with the basic capabilities of processing, storage, and networking. E) The user has control over the applications but has limited or no control over the underlying infrastructure.

A

With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external phone calls or connect internal telephone extensions. A) private branch exchange B) body sensor network C) power management unit D) point to point protocol E) near field communication

A

________ is designed to shield programmers from having to build applications for different underlying operating systems, particularly in heterogeneous, distributed environments. A) Middleware B) Malware C) Spyware D) Grayware E) Peopleware

A

________ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers. A) Reintermediation B) Remutualization C) Gentrification D) Defalcation E) Reaffirmation

A

10) With respect to the general classes of computers, a ________ is used for small business computing. A) workstation B) personal computer C) mainframe D) server E) supercomputer

B

12) The most prominent type of system software, the ________, coordinates the interaction between hardware components, peripherals, application software, and users. A) random-access memory B) operating system C) read-only memory D) base station E) point to point protocol

B

7) With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network. A) workstation B) server C) personal computer D) supercomputer E) mainframe

B

A ________ is any computer on the network, or any software application that uses only the services provided by the server. A) peer B) client C) host D) console E) port

B

Companies using a ________ business strategy are also called virtual companies. A) click-and-flip B) click-only C) brick-and-mortar D) bricks-and-clicks E) click-and-mortar

B

Governmental regulations such as the ________ Act mandate archiving business documents and relevant internal communication, including e-mail and instant messages. A) Glass-Steagall B) Sarbanes-Oxley C) Robinson-Patman D) Celler-Kefauver E) Taft-Hartley

B

In a URL, the ________ is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request. A) domain name B) host name C) client name D) top-level domain name E) port name

B

The ".com" suffix in a uniform resource locater is reserved for ________. A) non-profit organizations B) commercial organizations C) network organizations D) government entities E) educational organizations

B

The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information. A) private branch exchange B) World Wide Web C) point to point protocol D) Media Access Control Address E) parameter random access memory

B

The auction site eBay.com is an example of ________ electronic commerce. A) business-to-business B) consumer-to-consumer C) business-to-consumer D) consumer-to-business E) government-to-business

B

Which of the following statements is true about a Uniform Resource Locator? A) It is used to locate specific information in a Web page. B) It is used to identify and locate a particular Web page. C) It is a protocol that helps Web servers store Web pages. D) It is a standard method for specifying the format of Web pages. E) It is a software application used to display the features of a Web page.

B

Which of the following statements is true about a public cloud? A) It gives the organization a high degree of customizability over their data and applications. B) It can be used by any interested party on a pay-per-use basis. C) It is internal to an organization. D) It does not free an organization from the issues associated with managing the cloud infrastructure. E) It gives the organization a high degree of control over their data and applications.

B

Which of the following statements is true about firms pursuing a brick-and-mortar business strategy? A) These firms avoid indulgence in physical store locations. B) These firms avoid indulgence in electronic commerce. C) These firms are only involved in export business activities. D) These firms indulge in rafter bidding activities. E) These firms operate in both physical and virtual arenas.

B

With respect to the recent trends in IS hardware infrastructure management, ________ is moving processing and data storage away from a centralized location to the "corners" of a network. A) green computing B) edge computing C) grid computing D) trusted computing E) distributed computing

B

________ is used to transmit voice and video communication over the Internet. A) Edge computing B) IP convergence C) Distributed computing D) IP routing E) IP console

B

11) With respect to the five general classes of computers, a ________ is typically used for scientific research. A) mainframe B) workstation C) supercomputer D) microcomputer E) server

C

9) Which of the following general classes of computers designed for medical, engineering, or animation and graphics design uses are optimized for visualization and rendering of three-dimensional models, and typically have fast processors, large memory, and advanced video cards? A) mainframes B) supercomputers C) workstations D) servers E) personal computers

C

A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users. A) Web ring B) static Web site C) firewall D) proxy server E) Web page

C

Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. A) near-me area B) metropolitan area C) virtual private D) body sensor E) storage area

C

Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently. A) structured query language B) hyper text markup language C) assembly language D) extensible markup language E) practical extraction and report language

C

Which of the following is a result of global information dissemination? A) Firms link Web sites to corporate databases to provide real-time access to personalized information. B) Firms tailor their products and services to meet a customer's particular needs on a large scale. C) Firms market their products and services over vast distances. D) Firms provide immediate communication and feedback to and from customers. E) Firms provide ways for clients and firms to conduct business online without human assistance.

C

Which of the following is an example of reintermediation? A) The black Centurian card is issued by invitation only to customers who spend more than $250,000 a year on other American Express cards. B) P&G acquires a list of parents-to-be and showers them with samples of Pampers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, consisting of items like Dunkin' Dawgs, hot dogs wrapped in dough.

C

Which of the following is likely to have the suffix ".com" after the domain name in its URL? A) UNICEF B) The Federal Reserve C) Microsoft D) The World Wide Fund for Nature E) Massachusetts Institute of Technology

C

Which of the following statements is true about the platform as a service model? A) The customer is provided with the basic capabilities of processing, storage, and networking. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) Only the basic capabilities of processing, storage, and networking are provided. E) The customer has to manage the licenses for the operating systems being used.

C

With respect to computer networks, ________ are also referred to as Wi-Fi networks. A) storage area networks B) wireless body sensor networks C) wireless local area networks D) campus area networks E) personal area networks

C

________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second. A) Latency B) Data buffer C) Bandwidth D) Jitter E) Codec

C

________ software is the collection of programs that control the basic operations of computer hardware. A) Application B) Transitory C) System D) Open source E) Peripheral

C

________, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs. A) Grid computing B) IP edging C) IP convergence D) Edge computing E) IP console

C

13) Which of the following is an example of an operating system? A) Safari B) Microsoft Office C) Mozilla Firefox D) Ubuntu Linux E) Microsoft Surface

D

A ________ is a software application that can be used to locate and display Web pages, including text, graphics, and multimedia content. A) Webcam B) keylogger C) proxy server D) Web browser E) Webmaster

D

A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of ________ electronic commerce. A) business-to-consumer B) government-to-citizen C) government-to-business D) government-to-government E) business-to-business

D

Bandwidth is measured in ________. A) moles per second B) joules per second C) parts per million D) bits per second E) relays per second

D

In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) ________ grid, consisting of a large number of computers, can help overcome these problems. A) trusted B) edged C) clustered D) dedicated E) parallel

D

The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. A) extensibility B) portability C) reliability D) scalability E) usability

D

Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used. A) cluster computing B) grid computing C) distributed computing D) utility computing E) parallel computing

D

Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) Kobbler, a shoe manufacturer, conducts business over the Web with its retailers. C) Juan buys Kevin's guitar on eBay.com. D) Reuben buys a pair of shoes on Yebhi.com. E) Sandra, an employee, uses the Web to make a change in her health benefits.

D

Which of the following is an example of disintermediation? A) Land Rover markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Dunkin' Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, consisting of items like Dunkin' Dawgs, hot dogs wrapped in dough. C) Gatorade Thirst Quencher is a market leader in sports drinks. It is now planning to market its drinks to working women in urban areas. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment.

D

Which of the following is likely to have the suffix ".edu" after the domain name in its URL? A) Yahoo! B) UNICEF C) The Federal Reserve D) Harvard Business School E) America Online

D

Which of the following statements is true about an IP address? A) The format of an IP address is a 64-bit numeric address. B) It is written as eight numbers separated by periods. C) Each number separated by periods can have any number between 0 to 999. D) It can be used to navigate to particular Web addresses. E) It is written as a number with a period at the end

D

________ is used to solve large-scale computing problems. A) Trusted computing B) Edge computing C) IP convergence D) Grid computing E) Distributed computing

D

________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities. A) Server-centric B) Server-to-peer C) Client-to-peer D) Peer-to-peer E) Client-centric

D

As defined by the National Institute of Standards and Technology (NIST), "________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction." A) Green computing B) Social networking C) Internetworking D) Web phishing E) Cloud computing

E

Companies following a ________ business strategy choose to operate solely in the traditional physical markets, approaching business activities in a traditional manner. A) click-only B) click-and-mortar C) bricks-and-clicks D) click-and-flip E) brick-and-mortar

E

The phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) defalcation D) dissemination E) disintermediation

E

The standard method of specifying the format of Web pages is called ________. A) Structured Query Language (SQL) B) Practical Extraction and Report Language (PERL) C) Extensible Markup Language (XML) D) Assembly Language (AL) E) Hypertext Markup Language (HTML)

E

The suffix ".org" is reserved for ________. A) governmental entities B) commercial organizations C) network organizations D) educational institutions E) non-profit organizations

E

Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend Carla's account as she needs financial help. B) Heath buys a gift for Vannessa from Amazon.com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ted files his income tax online. E) Marty buys Lobsang's mountaineering equipment from eBay.com.

E

With respect to computer networking, ________ refers to the physical pathway—cable(s) and wireless—used to carry network information. A) multiplatform B) transmission control protocol C) random-access memory D) traceroute E) transmission media

E

With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps. A) personal area B) metropolitan area C) wide area D) campus area E) local area

E

A public cloud is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization.

F

A supercomputer is primarily used as the main, central computing system for major corporations.

F

Edge computing is moving processing and data storage from the "edges" of a network to a centralized location.

F

The application software used for various business processes can directly interact with these various types of computer hardware.

F

The applications under the Software as a Service model are typically the toughest to deploy.

F

The fundamental information units of computers are called relays.

F

The name "Internet" is derived from the concept of wireless networking.

F

With respect to the domain name, the suffix ".com" is reserved for network organizations.

F

Workstations are optimized for access by many concurrent users and therefore have more advanced microprocessors, more memory, a larger cache, and more disk storage than single-user computers.

F

Application software helps to automate business processes, and enables processes that would otherwise not even be possible.

T

In grid computing, the slowest computer creates a bottleneck and slows down the entire grid.

T

Information systems infrastructure consists of hardware, system software, storage, networking, and data centers.

T

Networking hardware and software facilitate the interconnection of different computers, enabling collaboration within organizations, across organizations, and literally around the world.

T

The easiest way to understand computer networking is through the human communication model.

T

The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.

T

Transmission media refers to the physical pathway used to carry network information.

T


Set pelajaran terkait

Final Exam: Sociology of Education

View Set

Business Administration Core Exam: DECA

View Set

Life Insurance Premiums, Proceeds, and Beneficiaries

View Set

Chapter 16: Postoperative Nursing Management

View Set

AP Gov- Chapter 6 Political Party

View Set

Psychology Ch.7 pg 4 (Cognition: problem solving, judgement, and insight)

View Set

BUS100 - Intro to Business (Unit 1-17) Final Exam Prep

View Set

P.E. Test 6- Exploring Exercises for Muscular Fitness 5

View Set

Drug Education and Vice Control 2

View Set