CIS 236
Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight in data c. Allowing analyzing data with different formats d. All of the above
All of the above
Registering, selling, or using a domain name to profit from someone else's trademark is called:
Cybersquatting
A smart home does not use a voice command by devices such an Amazon's Alex. True or False?
False
An intrusion detection system is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. True or False?
False
Computer literacy is understanding the role of information in generating and using business intelligence. True or False?
False
From 2000 through 2019, the highest Internet growth has occurred in North America. True or False?
False
In a data warehouse environment, ETL refers to extraction, transformation, and language. True or False?
False
The arithmetic logic unit (ALU) performs only arithmetic operations. True or False?
False
To improve the efficiency and quality of digital communications, Time Division Multiple Access (TDMA) divides each channel into two time slots. True or False?
False
True or False: Public information, posted by an organization or public agency, cannot be censored for public policy reason.
False
Webrooming is when consumers physically inspect a product in a store to get a look and feel for it—and then buy it from an online store because it is cheaper to do so. True or False?
False
One of the following is not a type of mobile analytics: a. Performance analytics b. Installation analytics c. In-app analytics d. Advertising and marketing analytics
Installation analytics
Software that gathers information about users while they browse the Web is called:
Spyware
A data hierarchy is the structure and organization of data, which involves fields, records, and files. True or False?
True
Access through mobile devices is among the features of a successful government Web site. True or False?
True
Application software can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer. True or False?
True
Data consists of raw facts and is a component of an information system. True or False?
True
Globalization has become an important factor in purchasing and the supply chain. True or False?
True
IIoT are used to enhance manufacturing and industrial processes such as predictive maintenance and data analytics on the factory floors. True or False?
True
In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False?
True
In the two-tier architecture of the client/server model, a client (tier one) communicates directly with the server (tier two). True or False?
True
Keystroke loggers monitor and record keystrokes and can be software or hardware devices. True or False?
True
Machine language is the first generation of computer languages and consists of a series of 0s and 1s representing data or instructions. True or False?
True
Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. True or False?
True
One of the main applications of database and database systems is database marketing. True or False?
True
Symmetric encryption is also called secret key encryption. True or False?
True
The Internet of Things (IoT) refers to the physical objects that are connected to the Internet and, therefore, to all other physical objects. True or False?
True
Transborder data flow (TDF) restricts what type of data can be captured and transmitted in foreign countries. True or False?
True
True or False: Repetitive typing with thumbs or navigating through various pages and apps is causing a health issue for many smartphone users called "smartphone thumb," also called tendinitis.
True
True or False: Replacing several underutilized smaller servers with one large server using a virtualization technique is one of the ways that green computing can be achieved.
True
The merchant model transfers the old retail model to the e-commerce world by using the medium of the Internet. True or False?
Ture
One of the following is not among the 5 Vs of big data: a. Value b. Variance c. Variety d. Veracity
Variance
A typical data communication system includes all of the following components except: a. A local area network b. Modems or routers c. Sender and receiver devices d. Communication medium (channel)
a. A local area network
One of the following has the highest bandwidth of any communication medium: a. Fiber-optic cable b. Twisted pair copper cable c. Coaxial cable d. Microwave
a. Fiber-optic cable
Which of the following layer of the OSI model is responsible for formatting message packets: a. Presentation b. Transport c. Session d. Application
a. Presentation
All of the following are among the obstacles to using global information systems except: a. Well-established telecommunication infrastructures b. Diverse regulatory practices c. Lack of standardization d. Cultural differences
a. Well-established telecommunication infrastructures
All of the following are among the potential drawbacks of telecommuting except: a. No regulated work routine b. Able to work in more pleasant surroundings c. Potential legal issues about workers' injuries d. Less interaction with coworkers
b. Able to work in more pleasant surroundings
All of the following are among the popular mobile marketing strategies except: a. Location-based marketing b. Customer-based marketing c. In-game mobile marketing d. App-based marketing
b. Customer-based marketing
One of the following is not among the important concepts regarding the Web and network privacy: a. Acceptable use policies b. Data integrity c. Accountability d. Nonrepudiation
b. Data integrity
All of the following could further expand voice-based e-commerce except: a. Assistant (Google) b. Firefox (Mozilla) c. Alexa (Amazon) d. Cortana (Microsoft
b. Firefox (Mozilla)
All of the following are among the new IT-related jobs except: a. Search engine optimization specialist b. Systems analyst c. Data scientist d. Social media/online-community manager
b. Systems analyst
All of the following are a part of the CIA triangle except: a. availability b. consistency c. confidentiality d. integrity
b. consistency
All of the following companies are among the key players for building and launching high-speed Internet satellites except: a. Amazon b. SpaceX c. Cisco Systems d. OneWeb
c. Cisco Systems
In Windows 10, the Internet Explorer was replaced by: a. Chrome b. Firefox c. Edge d. Safari
c. Edge
All of the following are features or applications of Web 2.0 except: a. Wikipedia b. iTunes c. Fiber-optic cable d. Cost per click
c. Fiber-optic cable
Information technologies are used to gain a competitive advantage by doing all of the following except: a. Delivering timely and accurate information b. Helping in reducing cost of operations c. Replacing all key decision makers in the organization d. Providing business intelligence
c. Replacing all key decision makers in the organization
Which of the following statements is false? a. The first generation of computers are identified by vacuum tube. b. The second generation of computers are identified by transistors. c. The third generation of computers are identified by miniaturization. d. The fourth generation of computers are identified by VLSI, personal computers, and optical discs.
c. The third generation of computers are identified by miniaturization.
One of the following is not among the intentional threats: a. Logic Bombs b. Social Engineering c. Denial-of-service Attacks d. Access Controls
d. Access Controls
All of the following are among the components of a social media information system except: a. Application (app) providers b. Sponsors c. User communities d. All of the above
d. All of the above
All of the following are among the future outlook of information systems, except: a. Hardware and software costs will continue to decline b. The computer literacy of typical information system users will improve c. Computer criminals will become more sophisticated d. All of the above
d. All of the above
All of the following are among the advantages of object-oriented programming except: a. Modularity b. Reuse of codes for other purposes c. Effective problem solving d. All of these answers are advantages of object-oriented programming
d. All of these answers are advantages of object-oriented programming
All of the following organizations do business across national borders except: a. International organizations b. Multinational organizations c. Global organizations d. Domestic organizations
d. Domestic organizations
Which of the following statements is false? a. The first generation of computer languages is machine language. b. The second generation of computer languages is assembly language. c. The third generation of computer languages is high-level language. d. The fourth generation of computer languages is natural language processing.
d. The fourth generation of computer languages is natural language processing.
All of the following are correct except: a. An IoT device could be hijacked and then send spam e-mails b. An IoT device could be hijacked and then deployed into botnets and used for DDoS attacks c. IoT devices are vulnerable to the threat posed by the Shodan search engine d. They are all correct
d. They are all correct