CIS 236 Mid-term exam

Ace your homework & exams now with Quizwiz!

All of the following are among the new IT-related jobs except: a. Systems analyst b. Search engine optimization specialist c. Data scientist d. Social media/online-community manager

A

All of the following are among the potential drawbacks of telecommuting except: a. Able to work in more pleasant surroundings b. Potential legal issues about workers' injuries c. Less interaction with coworkers d. No regulated work routine

A

Information technologies are used to gain a competitive advantage by doing all of the following except: a. Replacing all key decision makers in the organization b. Helping in reducing cost of operations c. Delivering timely and accurate information d. Providing business intelligence

A

One of the following has the highest bandwidth of any communication medium: a. Fiber-optic cable b. Coaxial cable c. Twisted pair copper cable d. Microwave

A

One of the following is not among the 5 Vs of big data: a. Variance b. Variety c. Veracity d. Value

A

Registering, selling, or using a domain name to profit from someone else's trademark is called: a. Cybersquatting b. Typosquatting c. Cyberspinach d. Cybercrime

A

Which of the following layer of the OSI model is responsible for formatting message packets: a. Presentation b. Transport c. Session d. Application

A

A typical data communication system includes all of the following components except: a. Sender and receiver devices b. A local area network c. Modems or routers d. Communication medium (channel)

B

One of the following is not among the important concepts regarding the Web and network privacy: a. Acceptable use policies b. Data integrity c. Accountability d. Nonrepudiation

B

One of the following is not a type of mobile analytics: a. Advertising and marketing analytics b. In-app analytics c. Installation analytics d. Performance analytics

C

One of the following is not among the intentional threats: a. Social engineering b. Denial-of-service attacks c. Access controls d. Logic bombs

C

Which of the following statements is false? a. The first generation of computers are identified by vacuum tube. b. The second generation of computers are identified by transistors. c. The third generation of computers are identified by miniaturization. d. The fourth generation of computers are identified by VLSI, personal computers, and optical discs.

C

All of the following are a part of the CIA triangle except: a. Confidentiality b. Integrity c. Availability d. Consistency

D

All of the following are among the advantages of object-oriented programming except: a. Modularity b. Reuse of codes for other purposes c. Effective problem solving d. All of the above

D

All of the following are among the future outlook of information systems, except: a. Hardware and software costs will continue to decline b. The computer literacy of typical information system users will improve c. Computer criminals will become more sophisticated d. All of the above

D

Software that gathers information about users while they browse the Web is called: a. Worm b. Adware c. Virus d. Spyware

D

Tableau and Power BI are used for all of the following purposes except: a. Exploring and finding patterns in data b. Creating multiple charts to get meaningful insight in data c. Allowing analyzing data with different formats d. All of the above

D

Which of the following statements is false? a. The first generation of computer languages is machine language. b. The second generation of computer languages is assembly language. c. The third generation of computer languages is high-level language. d. The fourth generation of computer languages is natural language processing.

D

An intrusion detection system is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. True or False?

False

Computer literacy is understanding the role of information in generating and using business intelligence

False

In a data warehouse environment, ETL refers to extraction, transformation, and language. True or False?

False

Public information, posted by an organization or public agency, cannot be censored for public policy reason. True or False?

False

The arithmetic logic unit (ALU) performs only arithmetic operations. True or False?

False

To improve the efficiency and quality of digital communications, Time Division Multiple Access (TDMA) divides each channel into two time slots. True or False?

False

A data hierarchy is the structure and organization of data, which involves fields, records, and files. True or False?

True

Application software can be commercial software or software developed in-house and is used to perform a variety of tasks on a personal computer. True or False?

True

Data consists of raw facts and is a component of an information system. True or False?

True

In data communication, convergence refers to integrating voice, video, and data so that multimedia information can be used for decision making. True or False?

True

In the two-tier architecture of the client/server model, a client (tier one) communicates directly with the server (tier two). True or False?

True

Keystroke loggers monitor and record keystrokes and can be software or hardware devices. True or False?

True

Machine language is the first generation of computer languages and consists of a series of 0s and 1s representing data or instructions. True or False?

True

Michael Porter's Five Forces Model analyzes an organization, its position in the marketplace, and how information systems could be used to make it more competitive. True or False?

True

One of the main applications of database and database systems is database marketing. True or False?

True

Repetitive typing with thumbs or navigating through various pages and apps is causing a health issue for many smartphone users called "smartphone thumb," also called tendinitis. True or False?

True

Replacing several underutilized smaller servers with one large server using a virtualization technique is one of the ways that green computing can be achieved. True or False?

True

Symmetric encryption is also called secret key encryption. True or False?

True


Related study sets

Chapter 7 Understanding and Auditing Internal Control & Substantive Tests

View Set

Chapter 13 - Herbs, Spices, and Perfumes

View Set