Вы находитесь на странице: 1из 22

2511 Session 7 Practice Multiple Choice Questions

1. There are several types of networks that a large organization could use. Which of the
following explains why it would use a LAN (local area network)? To
A) interconnect multiple LANs and WANs (wide area networks)
B) connect desktop computers, laptops and printers that are located in the same building
C) transmit and receive data over a broad geographical area
D) provide high speed central communications for multiple LANs and WANs

2. XYZ Inc. has many local area networks and wide-are networks that are interconnected. This is
an example of the use of a(n)
A) backbone network
B) wide area network
C) enterprise network
D) local area network

3. ABC Co. is upgrading its company’s local area networks, that span multiple buildings. It
wants high speed data communications and rapid response on the network and is ready to invest
in a top-quality infrastructure. Which wireline communications channel should ABC select?
A) twisted-pair wire
B) fibre-optic cable
C) coaxial cable
D) wireless fidelity

4. The type of client/server distributed processing where each computer acts as both a client and
a server is called
A) broadband processing
B) extranet
C) internet backbone
D) peer-to-peer processing

5. TCP/IP (Transmission Control Protocol/Internet Protocol) is actually a group of protocols that


manage delivery and receipt of data via the Internet. Which one of the following activities
happens FIRST?
A) sending and receiving IP addresses are assigned to packets
B) data are divided into packets and sequenced
C) packets are re-ordered and missing packets replaced
D) the path across the Internet is decided for each packet

1
6. TCP/IP (Transmission Control Protocol/Internet Protocol) is actually a group of protocols that
manage delivery and receipt of data via the Internet. Which one of the following activities
happens LAST?
A) sending and receiving IP addresses are assigned to packets
B) data are divided into packets and sequenced
C) packets are re-ordered and missing packets replaced
D) the path across the Internet is decided for each packet

7. The Internet enables users to access or discover information located in databases all over the
world. Which of the following is a network application of discovery?
A) electronic mail systems that are associated with a browser (communication)
B) the process of telecommuting, which allows workers with Internet access to work from home
(communication)
C) outsourcing a task to an undefined, generally large group of people
D) a corporate portal that offers a personalized, single point of access via a web browser

8. CBC News online provides a list by topic area that you can click on (such as world news,
sports, or health). If you subscribe to that topic, then you will receive, daily, an email that
summarizes new articles and a link where you can look at the new articles or videos. This is an
example of a(n)
A) weblog (blog)
B) wiki
C) RSS (really simple syndication)
D) mashup

9. XYZ Company has a map with a contact section. There you will find maps extracted from
Google Maps that show the company’s physical locations, so that you can easily find them. This
illustrates the use of a(n)
A) weblog (blog)
B) wiki
C) RSS (really simple syndication)
D) mashup

10. ABC Co. has an internal company website on which employees can post best practices,
standard forms, and details about company events. Any employee can update this section of the
company’s web site. This is an example of a(n):
A) weblog (blog)
B) wiki
C) RSS (really simple syndication)
D) mashup

2
2511 Session 8 Practice Multiple Choice Questions

1. Mega Co. builds hospitals, community centres, schools, and other buildings in the public
sector. Subcontractors of Mega Co. need to complete an application package in order to be
accepted as an approved supplier. Mega Co. posts requests for proposals (RFPs) on its web site
and subcontractors provide bids in response to the RFPs. What e-commerce business model is
Mega Co. Using?
A) Find-the-best price
B) Electronic tendering system
C) Name-your-own-price
D) Bartering online

2. Jonas Electronics sells its surplus equipment to tryhere.com for points, then can use the points
to buy office supplies at the same site. What e-commerce business model is Jonas Electronics
using?
A) Find-the-best price
B) Electronic tendering system
C) Name-your-own-price
D) Bartering online

3. Which of the following is a key mechanism of a B2B sell-side marketplace?


A) Reverse auction
B) Viral marketing
C) Customized electronic catalogue
D) Private exchange

4. Which of the following is a major method of obtaining goods and services using the B2B buy-
side marketplace?
A) Reverse auction
B) Viral marketing
C) Customized electronic catalogue
D) Forward auction

5. What is a key differentiator of satellite transmission versus microwave tower transmission?


Satellite transmission
A) Requires line of sight
B) Uses electro-magnetic waves
C) Has high bandwidth
D) Has an enormous footprint

3
6. Flightbound Co. is a satellite management company that helps organizations manage their
satellite communications. It works with providers and organizes funding for construction and
launch of satellites. XYZ Co. wants to use satellite primarily for teleconferencing. XYZ should
be given space on which type of satellite?
A) GEO (geostationary-earth-orbit) satellite
B) MEO (medium-earth-orbit) satellite
C) LEO (low-earth-orbit) satellite
D) A mix of GEO and MEO satellites

7. ABC Co. is considering adding wireless technology to its local area network since so many of
its employees use laptops and notebooks. ABC Co. should use:
A) The Bluetooth standard
B) Ultra wideband
C) Near-field communications
D) Wireless fidelity (Wi-Fi)

8. When a mobile device such as a smartphone is used to make payments, it is using what type of
network access?
A) The Bluetooth standard
B) Ultra wideband
C) Near-field communications
D) Wireless fidelity (Wi-Fi)

9. DEF Co. is creating advertising posters that will be displayed in grocery stores. The poster has
a feature that can be scanned by a camera phone and takes a user to the company’s web site. This
feature is enabled using a(n):
A) Active RFID (radio-frequency identification)
B) Passive RFID
C) UPC (universal product code)
D) QR (quick response) code

10. Tags attached to expensive products in a retail store that require batteries are called:
A) Active RFID (radio-frequency identification)
B) Passive RFID
C) UPC (universal product code)
D) QR (quick response) code

2511 Session 9 Practice Multiple Choice Questions

4
1. Which of the following is an example of master data that could be in the functional area of
accounting, as part of the sales system?
A) customer credit card limit
B) quantity purchased by the customer
C) invoice number for the sale
D) sales tax due with the sale

2. Which of the following is an example of transaction data that could be in the functional area of
accounting, as part of the sales system?
A) customer credit card limit
B) quantity purchased by the customer
C) customer first and last name
D) Permanent address of the customer

3. Mega Retail Co. has over 50 stores and sells thousands of different items. It employs close to
1,000 point-of-sale terminal operators (cashiers). To help ensure accuracy of the database,
especially for popular items, the company should
A) take backups of the database frequently
B) protect the database from overlapping updates
C) always have two copies of the database running
D) have all transactions processed twice as a check on accuracy

4. ABC Co. pays its employees every two weeks using a batch processing system. Hours worked
are recorded, then pay due is calculated by multiplying hours worked by the wage rate and
deducting taxes and other withholding amounts. What control could the company use to make
sure that all employees who worked hours during the two week period were paid?
A) match the total number of employees in the master file to the count of the number of
employees that worked
B) verify that the department manager approved all the hours worked
C) compare the count of the number of employees paid to the number of employees who
submitted hours
D) verify that the programs doing the payroll calculations are working properly

5. Which of the following is a benefit of ERP (enterprise resource planning) systems?


A) business processes in ERP systems are often predefined by vendor best practices
B) companies may need to change their existing business practices
C) systems can be extremely complex, expensive and time-consuming to implement
D) they provide essential information on business performance across functional areas

6. When an ERP system interacts directly with outside suppliers to place orders for goods (such
as perishable food), it is functioning as an

5
A) intraorganizational CRM (customer relationship management) system
B) interorganizational CRM (customer relationship management) system
C) interorganizational SCM (supply chain management) system
D) intraorganizational SCM (supply chain management) system

7. Jeff is checking on the overtime hours at his store. He first looked at a graph on-screen that
showed him the warehouse had the most overtime. Then, he looked at a list of employees to see
which employees had the most overtime. What type of reports is Jeff using?
A) routine
B) key-indicator
C) drill-down
D) comparative

8. Jeff has received a report that shows total sales for the store for the day, total employee hours
worked for the day, and number of customers that purchased products that day. What type of
report is it?
A) routine
B) key-indicator
C) drill-down
D) comparative

9. Every month, after the payroll has been calculated, a payroll journal (showing details of every
pay) and a payment register (showing payments to the bank) are produced. What type of reports
are these?
A) routine
B) key-indicator
C) drill-down
D) comparative

10. The report that shows quarterly sales for each store listed beside quarterly sales at the same
time last year is what type of report?
A) routine
B) key-indicator
C) drill-down
D) comparative

2511 Session 10 Practice Multiple Choice Questions

1. Data consolidation and the 360 degree view of the customer can happen when:
A) Customer data are stored in the appropriate functional areas, i.e. finance, sales and marketing
B) Modern interconnected systems are built around a data warehouse
C) Customer touch points are used to create diverse interactions with customers
D) A customer interaction centre (CIC) or call centre, is used to work with customers

6
2. Which of the following is an example of a customer-facing CRM (customer relationship
management) application?
A) The use of personalized web pages to track purchases and preferences
B) A loyalty program that recognizes customers for repeatedly using a vendor’s products or
services
C) Sales force automation that automatically records all of the components in a sales transaction
D) Customer products or services that are self-configured (i.e. mass customization)

3. Loyalty programs are appropriate for an organization to use when:


A) There is a high frequency of repeat customers, and there is limited product customization
B) Customers purchase a large dollar amount and so are profitable customers
C) The organization has many customers who have a diverse set of needs
D) When there is a large variety of products (including customization) that are easily tracked

4. Which of the following is an example of a customer-touching application?


A) The use of a customer interaction centre (CIC) to receive and transmit requests by telephone
B) A loyalty program that recognizes customers for repeatedly using a vendor’s products or
services
C) Sales force automation that automatically records all of the components in a sales transaction
D) An information help desk that assists customer with their questions

5. Which type of CRM is used to provide business intelligence by analyzing customer behaviour
and perceptions?
A) Operational CRM
B) On-demand CRM
C) Mobile CRM
D) Analytical CRM

7
6. Which of the following relates to the upstream portion of a typical supply chain?
A) Schedule the activities necessary for production, testing, packaging and shipment
B) The quality of production is monitored, including production output and employee
productivity
C) Coordinate the receipt of orders from customers, develop a network of warehouses
D) Select suppliers to deliver goods and services that the company needs to produce its product

7. What are the typical flows in the supply chain?


A) Material, information and financial
B) Physical products, raw material, and information
C) Data related to demand, information and financial
D) Physical products, data related to demand and changes to such data

8. Which of the following best describes the role of the push model in supply chain management
systems?
A) Known as make-to-order, the production process begins with a customer order
B) Known as make-to-stock, the production process begins with a forecast
C) It is a communication standard that enables business partners to exchange routine documents
D) It fosters collaboration between and among business partners by linking them over the
Internet to certain areas of each other’s corporate intranets

9. Which of the following best describes the role of extranets in supply chain management
systems?
A) Known as make-to-order, the production process begins with a customer order
B) Known as make-to-stock, the production process begins with a forecast
C) It is a communication standard that enables business partners to exchange routine documents
D) It fosters collaboration between and among business partners by linking them over the
Internet to certain areas of each other’s corporate intranets

10. Which of the following best describes the role of the pull model in supply chain management
systems?
A) Known as make-to-order, the production process begins with a customer order
B) Known as make-to-stock, the production process begins with a forecast
C) It is a communication standard that enables business partners to exchange routine documents
D) It fosters collaboration between and among business partners by linking them over the
Internet to certain areas of each other’s corporate intranets

2511 Session 11 Practice Multiple Choice Questions

8
1. The intelligence phase of Simon’s decision-making model requires gathering accurate
information so that a problem statement can be developed. Which of the following software
would help with this process?
A) Project management software
B) Transaction processing system
C) Decision support system
D) Expert system

2. The implementation phase of Simon’s decision-making model requires that the selected
solution to the problem be implemented. Which of the following software would help with this
process?
A) Project management software
B) Transaction processing system
C) Decision support system
D) Expert system

3. A manager who is working as a leader or liaison between multiple functional areas is using
which basic management role (as described by Mintzberg)?
A) Interpersonal
B) Informational
C) Decisional
D) Operational

4. A manager who allocates resources and works as a negotiator is using which basic
management role (as described by Mintzberg)?
A) Interpersonal
B) Informational
C) Decisional
D) Operational

5. Online analytical processing, also known as multi-dimensional analysis, is best used for which
of the following types of data analysis?
A) Trend analysis
B) Identifying previously unknown patterns
C) Drill down
D) Transformation and reformatting

9
6. Business intelligence applications in data analysis using data mining help an organization by
A) Slicing and dicing data
B) Identifying previously unknown patterns
C) Drilling down
D) Transforming and reformatting

7. Which of the following is a key reason that executives would use a digital dashboard? It
A) Provides rapid exception reporting
B) Often has a complex user interface
C) Provides a high level of detail in regular reports
D) Allows for what-if analysis of underlying assumptions

8. Which type of artificial intelligence system can be used to provide documentation of a


decision-making process?
A) Genetic algorithm
B) Intelligent agent
C) Neural network
D) Expert system

9. Which type of artificial intelligence system can recognize patterns difficult for humans to
detect?
A) Genetic algorithm
B) Intelligent agent
C) Neural network
D) Expert system

10. A software program that uses artificial intelligence to act on your behalf to perform
repetitive, computer-related tasks is called a(n)
A) Genetic algorithm
B) Intelligent agent
C) Neural network
D) Expert system

ssion 12 Practice Multiple Choice Questions

1. Which of the following is one of the objectives of an IT (information technology) strategic


plan?
A) Technological, financial, personnel and other resource limitations of the IS (information
systems) function
B) Agile development that incorporates scrum sets of practices and predefined roles
C) Custom built software that is developed in-house or by an outsourcing supplier
10
D) An IT architecture that seamlessly networks users, applications and databases

2. A typical IS operational plan contains which of the following elements?


A) Technological, financial, personnel and other resource limitations of the IS (information
systems) function
B) Agile development that incorporates scrum sets of practices and predefined roles
C) Custom built software that is developed in-house or by an outsourcing supplier
D) An IT architecture that seamlessly networks users, applications and databases

3. When an organization has unique IT needs that can create competitive advantage, it should
use:
A) Technological, financial, personnel and other resource limitations of the IS (information
systems) function
B) Agile development that incorporates scrum sets of practices and predefined roles
C) Custom built software that is developed in-house or by an outsourcing supplier
D) An IT architecture that seamlessly networks users, applications and databases

4. ABC Co. wants to have greater user involvement and more rapid systems implementations. It
should use:
A) Technological, financial, personnel and other resource limitations of the IS (information
systems) function
B) Agile development that incorporates scrum sets of practices and predefined roles
C) Custom built software that is developed in-house or by an outsourcing supplier
D) An IT architecture that seamlessly networks users, applications and databases

5. A set of long-range goals that describe the IT infrastructure and identify the major IT
initiatives needed to achieve an organization’s goals is called an:
A) IT network architecture
B) Applications portfolio
C) IT strategic plan
D) IS operational plan

6. Managers and staff who represent various organizational units to ensure that the MIS
functions meet the organization’s needs are called (an):
A) IT steering committee
B) IS planning committee
C) IT strategic managers
D) IS operational managers

7. The cost-benefit method that prepares a written analysis to justify one or more specific
applications with a methodical descriptive process is called (the)
11
A) Net present value (NPV) method
B) Return on investment (ROI)
C) Break-even analysis
D) Business case approach

8. The cost-benefit method that measures management’s (and thus a system’s) effectiveness in
generating profits with available assets is called (the)
A) Net present value (NPV) method
B) Return on investment (ROI)
C) Break-even analysis
D) Business case approach

9. The cost-benefit method that converts the future values of benefits to their cash value now
using a “discount” rate that is equal to the organization’s cost of funds is called (the)
A) Net present value (NPV) method
B) Return on investment (ROI)
C) Break-even analysis
D) Business case approach

10. The cost-benefit method that compares the cumulative dollar value of the benefits from a
project to the investment made in the project is called (the)
A) Net present value (NPV) method
B) Return on investment (ROI)
C) Break-even analysis
D) Business case approach

2511 Session 1 Practice Multiple Choice Questions

1. Which of the following best describes the nature of a data item? It is


A) business analytics that has been organized to provide meaning
B) an elementary description of things or events that are recorded and classified
C) data that conveys understanding and accumulated experience
D) organized to provide value to the recipient who interprets the meaning

2. ABC Inc. is a manufacturer of men’s clothing. Which of the following is an example of a


possible data item at ABC Inc.?
A) a report of clothing sold in the last 30 days
B) an analysis of which fabrics cost least
C) the clothing item numbers
D) a list of obsolete styles that will be used to return unsold inventory

12
3. XYZ Inc. is a retailer of children’s clothing. Which of the following is an example of payroll
information that could be used at the store?
A) the store owner’s feelings about which employees are the best salespeople
B) a list of employee hours worked for the whole year
C) taxes deducted from paycheques for the last few months
D) the employee schedule that provides start and end time by employee

4. UEF Co. designs and manufactures ladies’ clothing. Which of the following is an example of
knowledge that could relate to UEF Co.?
A) the decision to use a cashmere-silk blend for a new skirt design by the head designer
B) a report of the return rates by item, showing most frequently returned first
C) a screen shot of the name and address of the local distributor of Italian wool
D) a production plan that shows the number of items by size produced daily

5. A computer-based information system’s information technology components are software,


hardware, database and network. Which of the following would be part of a clothing store’s
database?
A) the electronic storage of customer names and addresses, including amounts purchased
B) the server farm used to store operating systems and application programs
C) the point-of-sale system used by sales clerks to record customer sales
D) the router used to transmit data from the head office to the branch server

13
6. Which of the following reports would most likely have been prepared using an ERP
(enterprise resource planning system)?
A) a calendar showing meetings happening in the next month
B) the materials requirements for all factory locations for the next week
C) a list of the employees paid this month and their total pay
D) an analysis showing what would happen to production costs if cost prices went up by 25%

7. Which of the following would have been performed using a transaction processing system?
A) sending an email announcement about next week’s meeting
B) requesting the day off using an online calendar system
C) entering the sale of groceries at a store using a point-of-sale system
D) calculating the potential effect of interest rate changes on production costs

8. Which of the following is a hardware component of a computer-based information system?


A) an Internet browser such as Firefox
B) the app used to retrieve recent photos of friends
C) a smartphone used to pay for a purchase
D) word processing programs used to write memos

9. How does IT affect managers at organizations?


A) it increases the number of managers since more complex decisions have to be made
B) managers need to take longer to make decisions, since a lot more information is available
C) less manager training is required since more software tools are available for decision-making
D) managers have less time to make decisions since near real-time information is provided

10. How does IT affect employees at organizations?


A) employees have experienced a loss of identity, feeling “just like another number”
B) safety at work has improved because people can sit at a desk all day working with computers
C) there is less stress at work because working with computers is easy
D) there is more social contact, since e-mail and chat can be used to connect with coworkers 24/7

Effective date: April 27, 2019

2511 Session 2 Practice Multiple Choice Questions

1. A business process has three fundamental elements: inputs, resources, and outputs. Which of
the following could be an input into the software change process for adapting security software
to changing business conditions?
A) updated software on DVDs, ready to ship
B) the software programmer and her skill set
C) program version tracking to control program version numbers
14
D) requirements specifications providing a list of new security flaws

2. A business process has three fundamental elements: inputs, resources, and outputs. Which of
the following could be an output from the software change process for adapting security software
to changing business conditions?
A) updated software on DVDs, ready to ship
B) the software programmer and her skill set
C) program version tracking to control program version numbers
D) requirements specifications providing a list of new security flaws

3. Which of the following is a cross-functional business process?


A) the payroll clerk enters hours worked by typing them from an approved timesheet
B) both the accounting manager and the human resources manager approve new employee wage
rates
C) the accounting clerk sends payroll data to the bank for payment processing
D) the human resource manager approves employee purchases of company products

4. Information systems enable a business process by facilitating process execution, the capturing
and storing of process data and the monitoring of process performance. Which of the following
relates to capturing and storing process data?
A) calculation of the amount that an employee is to be paid, using hours worked and approved
pay rates
B) review of hours worked list to check that employees did not work too many overtime hours
C) transferring amounts paid to employees to the employee master file in the human resources
database
D) matching the total paid to employees to the dollar amount sent to the bank to enable direct
deposit payments

5. Which of the following describes how the globalization market pressure affects a large
company such as BlackBerry, in relationship to the company’s sale of smartphones?
A) sophisticated customers can better decide the features they desire in a phone
B) new types of computer chips can quickly render a whole line of phones obsolete
C) as people work remotely, they demand more functionality in their telephones
D) organizations around the world can operate without reference to borders and sell phones that
compete with the company

15
6. If someone invents a new line of computer chips for smartphones that would render existing
telephones obsolete, this would be an example of what type of business pressure?
A) powerful customers
B) technological innovation
C) globalization
D) social responsibility

7. When you order a tunic top from Linens R Us, you can specify the sleeve length and overall
length of the top to best match your height and Linens R Us will make a top just for you. This
organizational response is known as:
A) mass customization
B) customer focus
C) make-to-order
D) competitive advantage

8. Uber used software to turn every-day drivers into taxi drivers, changing the way people travel.
Using Porter’s competitive Forces Model, this is related to:
A) the threat of entry of new competitors
B) the bargaining power of suppliers
C) the rivalry among existing firms in the industry
D) high entry barriers to entry

9. Which of the following would be a primary activity for a retail store using Porter’s Value
Chain Model?
A) updating the operating systems for all the computers and point-of-sale devices at the store
B) hiring new cashiers, setting their wages, and teaching them how to use the store’s point-of-
sale systems
C) developing a design layout for which products should be displayed on particular shelves in
the store
D) sending products from the warehouse to the stores across Canada

10. WalMart negotiates extensively with its suppliers to bargain for lower prices. It also uses
information technology and management practises to have the company sell at prices lower than
everyone else. This example illustrates which type of strategy for competitive advantage?
A) cost leader
B) differentiation
C) operational effectiveness
D) customer oriented
2511 Session 3 Practice Multiple Choice Questions

16
1. Jamie argues that by recycling as much as possible of his kitchen waste, he is benefitting the
environment, reducing waste, and helping to provide resource materials for the recycling
industry. Which ethical framework best aligns with Jamie’s reasoning?
A) utilitarian approach
B) rights approach
C) fairness approach
D) common good approach

2. DEF Co. prides itself in using truth in advertising, clearly listing all product ingredients. XYZ
Co. follows best practices in safety standards and teaches employees carefully in how to use its
manufacturing equipment. Which ethical framework best relates to these actions?
A) utilitarian approach
B) rights approach
C) fairness approach
D) common good approach

3. ABC Co. decided to give every employee a chance at choosing day or night shift. This
example is best associated with which ethical framework?
A) utilitarian approach
B) rights approach
C) fairness approach
D) common good approach

4. Human errors (mistakes) by employees can be mitigated by


A) having more complex passwords
B) doing backups of data more often
C) protecting equipment with stronger physical security
D) improved employee education and training

5. ABC Company has decided that employees should protect their passwords and use difficult to
guess passwords. Employees who are caught sharing passwords are suspended for a week
without pay. What type of risk mitigation strategy is the company using?
A) risk acceptance
B) risk limitation
C) risk transference
D) risk balancing

6. XYZ Company wants to ensure that only the human resource manager can approve and verify
wage rates in the payroll system. How is this best accomplished?
A) via the control environment
B) using a general computer control
17
C) with communications controls
D) using application controls

7. What type of control is biometric identification?


A) authentication
B) authorization
C) application
D) communications

8. Organizations that want to protect their data and software from unauthorized access via the
Internet should have protection that includes:
A) dual backups of data and software
B) regularly updated firewalls
C) passwords on all functional applications
D) biometric access to the computer room

9. DEF Co. uses employee monitoring systems to examine employee’s computers, email
activities and Internet surfing activities. The main reason for such monitoring is to:
A) prevent access to pornographic web sites
B) detect or prevent employee mistakes
C) track how much time employees spend on FaceBook
D) detect attempts at unauthorized activity

10. What risk does data encryption mitigate?


A) incomplete data
B) data theft
C) data corruption
D) data eavesdropping

2511 Session 4 Practice Multiple Choice Questions

1. Which of the following is an example of master data that could be present at a retail store?
A) invoice number
B) customer number
C) cheque number
D) purchase order number

2. Which of the following is an example of transaction data that could be present at a retail store?
A) employee name
B) inventory description
C) employee address
D) hours worked

18
3. What is the purpose of data governance? To
A) detect errors in transactions after they have occurred
B) ensure that the organization is effectively managed
C) provide an approach to managing data across an entire organization
D) test the effectiveness of data management controls over privacy

4. Which of the following should be included in a data dictionary for a retail organization?
A) type of data expected for the attribute customer number
B) description of entities (such as customer, employee)
C) explanation of the relationship between the employee entity and the store entity
D) listing the privacy policies that need to be followed for customer data

5. The purpose of the SQL WHERE statement is to


A) describe the attribute that is being queried
B) list the name of the file that holds the data being queried
C) provide the criteria for the selection process
D) explain how the results of the query are to be shown

6. Which of the following components of the data hierarchy are the smallest?
A) database
B) attribute
C) file
D) entity

19
7. Which of the following is used to uniquely identify a record?
A) primary key
B) secondary key
C) foreign key
D) instance

8. A repository of historical data that is integrated, and organized by business dimension or


subject is called a:
A) database
B) data dictionary
C) flat file (sequential)
D) data warehouse

9. Which of the following is an example of explicit knowledge that could apply to a retail store?
A) how to sell children’s clothing
B) methods to be used for tagging expensive items
C) which clothing to order from next year’s styles
D) the colours that go best with certain types of lighting

10. ABC Stores Inc. has set up chat groups for its salespeople to share information about sales
best practices. The administrative assistant to the store manager has been assigned the task of
reading chats on a weekly basis and listing ideas from them for the sales manager. Which phase
of the knowledge management cycle is the administrative assistant performing?
A) create knowledge
B) capture knowledge
C) refine knowledge
D) store knowledge

2511 Session 5 Practice Multiple Choice Questions

1. Which of the following best describes the purpose of secondary storage?


A) temporarily stores data and program instructions during processing
B) presents data and information in a format people can understand
C) stores data and programs for future use
D) manipulates data and controls tasks performed by hardware components

2. A keyboard and mouse are both examples of input technology. The purpose of input
technology is to:
A) temporarily store data and program instructions during processing
B) accept data and instructions and convert them to a form the computer can understand
C) store data and programs for future use
20
D) manipulate data and control tasks performed by hardware components

3. There are several types of primary storage, or main memory. Which has the least capacity?
A) registers
B) cache memory
C) RAM (random access memory)
D) ROM (read only memory)

4. Your company uses open system software on all of its desktop computers. Which of the
following best describes open systems software?
A) it is purchased software that has restrictions on use
B) it is available at no cost (i.e. it is free)
C) core developers work to modify and upgrade the software
D) this group of software works together to facilitate best of breed development

5. The “director” software of the computer systems’ functions that monitors the computer and
manages overall functioning, input and output is called the
A) operating system
B) graphical user interface
C) ROM (read only memory)
D) cache memory

6. What stage of IT (information technology) infrastructure enabled cloud computing?


A) use of mainframe computing with dedicated terminals
B) local area networks with client/server computing
C) access to a shared pool of computing resources over a network
D) enterprise computing, which integrated different kinds of networks.
7. Cloud computing has important enabling characteristics. When hardware and software are
pooled to create a single information technology environment with shared resources, it is called
A) on-demand self-service
B) grid computing
C) utility computing
D) server virtualization

8. An advantage of cloud computing is that a customer only pays for what it uses (both
computing power and data storage). When a service provider makes computing resources and
infrastructure management available to a customer as needed, this is called:
A) on-demand self-service
B) grid computing
C) utility computing
D) server virtualization
21
9. What distinguishes IaaS (infrastructure-as-a-service) from PaaS (platform-as-a-service) and
SaaS (software-as-a-service)?
A) provision of operating system and application level software is included
B) software development technologies such as Java can be used by customers
C) customers can use application software as part of the cloud services
D) remotely accessible servers, networks and storage capacity are offered

10. What distinguishes SaaS (software-as-a-service) from IaaS (infrastructure-as-a-service) and


PaaS (platform-as-a-service)?
A) provision of operating system and application level software is included
B) software development technologies such as Java can be used by customers
C) customers can use application software as part of the cloud services
D) remotely accessible servers, networks and storage capacity are offered

22