Академический Документы
Профессиональный Документы
Культура Документы
Student No
Surname
Group No
General Remarks:
1. This is a closed book exam.
2. Attempt ALL questions.
3. Make sure you have 7 different pages including this page.
4. All work to be done in the spaces provided on the exam paper.
5. No books, notes and dictionaries are allowed.
6. Mobile phones are not allowed. All mobile phones should be switched
off during the exam.
Marks
Total (50 pts)
Good Luck.
1. If part of your academic work was to read the Wall Street Journal's
articles on information technology and these articles were automatically
delivered to your account, what type of technology would you be using?
a. M-commerce
b. Internet search and deploy
c. Push
d. Pull
2. Which of the following systems development techniques allows end
users to develop business applications?
a. Outsourcing
3.
4.
5.
6.
b. Insourcing
c. Netsourcing
d. Selfsourcing
The SDLC contains 7 phases. Which phase is devoted to creating a solid
plan for developing your information system?
a. Initiation
b. Planning
c. Design
d. Analysis
The SDLC contains 7 phases. Which phase verifies that the system works
and meets all the business requirements developed in an earlier phase?
a. Development
b. Transformation
c. Implementation
d. Testing
The SDLC contains 7 phases. Which phase monitors and supports the
new system to ensure it continues to meet your business goals?
a. Implementation
b. Testing
c. Maintenance
d. Operations
Which of the following occurs when the scope of the project increases
beyond its original intentions?
a. Scope creep
b. Feature creep
c. Milestone
d. Rolling stone
7. In what phase of the SDLC is the technical architecture for the proposed
system defined?
a. Planning
b. Design
c. Analysis
d. Development
8. Which of the following is not an advantage to prototyping?
a. Prototyping encourages active user participation
b. Prototyping helps resolve discrepancies among users
c. Prototyping gives users the final system
d. Prototyping helps determine technical feasibility
9. In which phase does the project team move from the physical design to
the physical implementation?
a. Implementation
b. Testing
c. Development
d. Transformation
b. Design specification
c. Request for proposal (RFP)
d. Project scope document
15.If you were concerned about how a person would feel because of
something you did, you would be experiencing what type of influencing
circumstance?
a. Consequences
b. Likelihood of effect
c. Relatedness
d. Reach of result
16.Which of the following is the unauthorized use, duplication, distribution,
or sale of copyrighted software?
a. Pirated software
b. Spam
c. Phishing
d. Sneakware
17.What is the right to be left alone when you want to be, to have control
over your own personal possessions, and not to be observed without
your consent?
a. Ethics
b. Personal safety laws
c. Identity theft laws
d. Privacy
18.What program records every keystroke and mouse click executed on a
computer?
a. Keyboard recorder
b. Trojan horse
c. Virus
d. Key logger
a. Behaviometrics
b. Human system recognition
c. Biometrics
d. Physiological systems
27.If you were traveling abroad and needed to use some software that you
did not currently have, and did not want to purchase, what type of
software could you rent during this trip?
a. Leasing Online Software and Services (LOSS)
b. Software-as-a-Service (SaaS)
c. Electronic Rental Software (eRent)
d. Application Service Provider (ASP)
28.What type of Internet company provides pay-per-use software?
a. Software leasing
b. Software developers
c. Software-as-a-service (Saas)
d. Application service provider (ASP)
29.What Web environment features online collaboration, dynamic and
customized feeds, and greater control of Web content by users?
a. Wiki
b. Web 2.0
c. CAVE
d. Social networking
10
11
b. Implant chip
c. Facial recognition software
d. Vision chip
39.What is the term used to show the great differences between those who
have technology and those who do not?
a. Web barrier
b. Digital divide
c. Technological disadvantaged
d. Information Poor
40.Despite the advantages of technology, which of the following is
sacrificed in exchange for convenience?
a. Money
b. Privacy
c. Technology
d. Paper
41.What uses a microchip in a product label to store information that is
transmitted by a reader using radio waves?
a. Radio Frequency identification
b. Implant chips
c. Biochip
d. UPC
42. What is the waterfall methodology?
a. A sequential, activity based SDLC
b. An assessment methodology that ensures quality applications
12
13
d. Criterion checking
47.Which infrastructure-centric metric measures the error rate or the
number of errors per thousand (or million) that an information system
generates?
a. Accuracy
b. Throughput
c. Scalability
d. Critical success factor
48.
Which call center metric determines the percentage of callers who
hang up while waiting for their call to be answered?
a. Abandon rate
b. Lost calls
c. Missed rate
d. Failure to answer rate (FAR)
49.If you were trying to access your campus network but the system was
unable to respond to you because it was overwhelmed with a flood of
requests coming from some virus, what type of attack would you be
experiencing?
a. Worms
b. Script kiddies
c. Denial-of-service
d. Cyber blackmail
50.What is a CAVE?
a. A simulation device used to train and instruct special forcers in the
climbing, firefighting, and search and rescue industry
b. A three-dimensional computer simulation in which you can actively and
physically participate
c. A virtual reality room that can display images and other people from other
CAVEs
d. An advanced and secured communication system used for extremely
sensitive data
14