info systems

Ace your homework & exams now with Quizwiz!

*** The cost of producing an additional unit of a product is known as its: *** A. isocost. B. transaction cost. C. marginal cost. D. redundancy cost. E. implicit cost.

marginal cost

The _____ is the part of a computer that executes the instructions of a computer program. A. software B. flash memory C. DWDM D. random-access memory or RAM E. microprocessor

microprocessor

. _____ refers to software that is free and where anyone to look at and potentially modify the code. A. Social software B. Proprietary software C. Licensed software D. Open source software E. Software as a service

open source software

The third wave of computing was characterized by the introduction of _____. A. personal computers B. mainframe computers C. minicomputers D. Internet computing E. laptops

personal computers

*** 1 petabyte = 1 _____ bytes *** A. million B. billion C. trillion D. quadrillion E. sextillion

quadrillion

. Moore's Law kicked in during the 1970s for the_____________, and minicomputers were a hit. Note: this question will appear on the exam A. first wave B. second wave C. third wave D. big corporations E. government

second wave

. _____ are substances that are capable of enabling as well as inhibiting the flow of electricity. A. Insulators B. Semiconductors C. Resistors D. Inductors E. Thermostats

semiconductors

. *** One of the factors that accelerated the development of the Internet during the 1990s was: *** A. the introduction of the personal computer into households. B. the government's taking over of the Internet's operating structure from private players. C. Intel's invention of low power processors used in portable computers. D. the creation of the Windows and Mac OS operating systems. E. the invention of graphical Web browsing.

the invention of graphical web browsing

. What are the implications for firms that do not have common database systems with consistent formats across their enterprise? A. They can save infrastructural and operational costs. B. They can expect to leverage economies of scale by serving more customers. C. They can hedge against the risk of data redundancy. D. They struggle to manage their value chain efficiently. E. They profit from the aggregation of diverse data sets and enhance their repositories.

they struggle to manage their value chain efficiently

The LAMP stack of open source products is used: A. as a template for most operating systems. B. to provide guidelines for programming databases. C. in debugging most of the software tools available today. D. as a global set of standards for software product improvements and official releases. E. to power many of the Internet's most popular Web sites.

to power many of the internet's most popular web sites

The address one types into a Web browser is also known as a: A. universal redirection link. B. uniform resource locator. C. unique resource locator. D. universal redirection locator. E. uniform resource link.

uniform resource locator

A firm that provides hardware and services to run Web sites of others is known as a(n) _____. A. Web site incubator B. Internet service facilitator C. Web domain name registrar D. Web hosting service E. Internet Web fab

web hosting service

. _____ are software systems designed to support interoperable machine-to-machine interaction over a network. A. Scripting languages B. Client-servers C. Web services D. Caches E. Business intelligence systems

web services

. A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities. A. hacktivist B. data harvester C. corporate spy D. white hat hacker E. ethical cyber criminal

white hat hacker

Which of the following is an example of application software? A. MS Word B. Mac OS C. Linux D. MS Windows E. Android

MS word

. Which of the following statements relating to open source software is true? A. The flagship OSS product is the Linux operating system, now available on all scales of computing devices. B. Open source software is available for anyone to download from the Internet, but the code should not be modified. C. The vast majority of people who work on efforts like Linux are now paid to do so by non-profit organizations such as the Linux foundation. D. The source code for open source software may be modified and redistributed, provided it is priced reasonably and part of the proceeds is contributed to the Linux Foundation. E. Major hardware firms no longer employ paid staff contributing to open source projects.

a

The software business is extremely profitable compared to the hardware business because: A. the marginal cost to produce an additional copy of a software product is effectively zero. B. of the lack of market price regulations and guidelines. C. software producers serve niche businesses sectors with high profit margins. D. software development is a one-time process with no upgrade costs. E. software firms benefit from special tax exemptions that aid profitability

a

Which of the following is not true about potential benefits to firms that create platforms? A. the potential to make their products and services more useful B. they can widen the reach of firms and products C. they can create switching costs D. they can enhance network effects E. all of the above are true

all of the above are true

_____ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. A. Emulators B. Applications C. Platforms D. Embedded systems E. Operating systems

applications

. *** What is an example of cybersquatting? *** A. Overwhelming a firm's Web site by flooding it with seemingly legitimate messages B. Acquiring a domain name to extort a firm, individual, product, or trademark holder C. Slowing down packet transfer to an Internet-connected computer D. Threatening to destroy information stored in a firm's servers E. Hacking into and defacing an organization's public web presence and refusing to let the site's owner regain control

b

Which of these would be an example of a DDoS attack? A. An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases B. Overloading a popular social networking site with inbound messages in order to shut down access to the site C. Launching a targeted phishing campaign on a department of defense or other surveilance network. D. Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services. E. Launching tough-to-track click-fraud efforts

b

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems. A. application server B. supply chain management C. enterprise resource management D. business intelligence E. customer relationship management

business intelligence

*** Which of the following statements holds true for the term "html"? *** A. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. B. It refers to the broadband service provided via light-transmitting fiber-optic cables. C. It refers to the language used to create and format Web pages. D. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. E. It refers to a system that connects end users to the Internet.

c

A(n) _____ is a temporary storage space used to speed computing tasks. A. cache B. IP address C. Protocol D. domain name service E. hypertext markup language

cache

. The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. A. cybersquatting. B. phishing. C. an online imposture. D. cache poisoning. E. a distributed denial of request.

cache poisoning

*** Firmware refers to: *** A. computer hardware elements visible to the human eye. B. control software stored on removable discs. C. control software stored on hard drives. D. control software stored on nonvolatile memory chips. E. computer hardware elements invisible to the human eye.

control software stored on nonvolatile memory chips

. A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? A. Cyber-fraud B. Corporate espionage C. Carrying out technology disruptions D. Extortion E. Illegal funds transfer

corporate espionage

. *** "Html" is used to: *** A. load content from default page. B. create and format Web pages. C. generate custom content for database users. D. exchange mail with other e-mail servers. E. transfer files from flash drives.

create and format web pages

. An attack on the US power grid by terrorists or a foreign power is indicative of: A. DDoS attacks. B. espionage. C. cyberwarfare. D. extortion. E. phishing.

cyberwarfare

. Which of the following statements is consistent with ground realities regarding information security? A. Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies. B. Law-enforcement agencies are well-resourced to fight cyber-crimes effectively. C. Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay. D. Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. E. Cyber-crime is not rewarding in terms of financial gain.

d

The fault-tolerant nature of the DNS ensures that: A. if users can't reach a host computer, they are redirected back to the previous page. B. mistyped or misspelled Web addresses are automatically corrected. C. if a document or file can't be accessed, it won't result in a 404 error. D. the service continues functioning even if one nameserver goes down. E. mismatched host names and domain names are still assigned with the correct IP address.

d

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? A. Lack of technology to identify the origin of a security attack B. Non-recognition of commission of a security-related crime C. Unwillingness of developed countries to share technical know-how with lesser-developed countries D. Non-existent extradition agreements between two countries E. Technological incompatibility between the two countries

d

. Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. A. cash-out fraudsters B. data harvesters C. corporate spies D. ethical hackers E. information hoarders

data harvestors

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. A. Enterprise software B. Server program C. Desktop software D. Software as a service E. Database management program

desktop software

. Popular sites like Google and Yahoo! have several computers assigned to their host names because: A. they have operations in different countries. B. they are registered under several generic top-level domain names. C. of the different devices used to access these web sites. D. hoarding all information in one server is expensive. E. it ensures that the load of requests to their sites do not overwhelm a single computer.

e

. Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory? A. Rising transportation costs greatly increase the costs of manufacturing and make moving inventory between locations highly expensive. B. Chip manufacturers maintain low inventories to hedge the move of semiconductor technology away from silicon-based chips. C. The potential physical and electronic damage to silicon chips if left unused for extended periods of time deters manufacturers from maintaining higher inventories. D. Chip manufacturers leverage the higher costs of chip-based products to their advantage by keeping supply low compared to demand. E. Products with a significant chip-based component rapidly fall in value and can cause huge losses when overproduced.

e

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: A. assigning IP addresses to different domain names. B. mapping host names to domain names. C. creating IP addresses that are unique to servers. D. assigning domain names to different IP addresses. E. mapping host and domain names to IP addresses of computers.

e

What is the most common function performed by electronic data interchanges? A. Housing and serving business logic for use and reuse by multiple electronic applications B. App store downloads and the serving of other types of rich media. C. Providing electronic reporting and analysis for organizational decision making D. Integrating various electronic functions of a business, such as accounting, finance, inventory management, and human resources E. Sending electronic equivalents of structured documents between different organizations

e

Which of the following was an outdated notion regarding open source software and has been shown to be inaccurate? A. Open source software is free and its code is available for anyone to look at and potentially modify. B. Open source software code can be changed and redistributed, provided the modified software remains open and free. C. Open source software is to technology what capitalism is to economics. D. The majority of persons who work on open source projects are paid by commercially motivated employers. E. Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

e

. _____ is a set of standards for exchanging messages containing formatted data between computer applications. A. EDI B. DBMS C. CPM D. SCM E. ERP

edi

. Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________. A. Desktop software programs B. Enterprise Resource Planning systems C. Embedded systems D. Multi-threaded E. Application servers

embedded systems

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources. A. Supply chain management B. Desktop software C. Customer relationship management D. Database management system E. Enterprise resource planning

enterprise resource planning

Which of the following technologies is(are) being used to replace the older EDI for specifying data standards? A. JavaScript object notation B. Hypertext transfer protocol C. Extensible markup language D. Both (a) and (b) E. Both (a) and (c)

extensible markup language

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players. A. Random-access memory B. Cache memory C. Optical storage memory D. Holographic memory E. Flash memory

flash memory

. 1____ = 1 billion bytes A. terabyte B. gigabyte C. megabyte D. petabyte E. zettabyte

gigabyte

The term _____ originally referred to a particularly skilled programmer. A. data harvester B. cracke C. hacker D. black hat E. hacktivist

hacker

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. A. activist B. cyber agitator C. hacktivist D. ethical hacker E. cybersquatter

hacktivist

Which of the following functions is likely to be performed by enterprise software? A. Word processing B. Spreadsheet accounting C. Making PowerPoint presentations D. Inventory tracking E. Internet browsing

inventory tracking

Which of the following sets of software represents the constituents of the LAMP stack? A. LimeWire, Acrobat Reader, Mozilla, Python B. Linux, Apache, MySQL, Perl C. Lingo, Afnix, Moby, PPL D. Linux, Android, Mac OS X, PHP E. LimeWire, AppleScript, MATLAB, Photoshop

linux, apache, mysql, perl


Related study sets

Chapter 3 ( Introduction to Classes, Objects, Member Functions, and Strings)

View Set

Chapter 9 Cellular Respiration/Fermentation

View Set

Discrimination II - Equal Pay: The Sex Equality Clause

View Set

PrepU chapter 7 Legal Dimensions of Nursing Practice

View Set

Chapter 14: Exchange Rate and Purchasing Power Parity

View Set

A&P 2 chapter 18 (heart physiology)

View Set

CSP Unit 1 Assessment Test 21-22

View Set