Вы находитесь на странице: 1из 29

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching.

TrueFalse 2. (Points: 1.0) A protocol is a standard set of rules and procedures for the control of communications in a network.

TrueFalse 3. (Points: 1.0) Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

TrueFalse 4. (Points: 1.0) In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.

TrueFalse 5. (Points: 1.0) Which type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server?

a. peer-to-peer b. wireless c. LAN d. ring

6. (Points: 1.0) Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?

a. wireless network in infrastructure mode b. domain-based LAN c. campus area network d. peer-to-peer network

7. (Points: 1.0) In a bus network

a. signals are broadcast in both directions to the entire network. b. signals are broadcast to the next station. c. multiple hubs are organized in a hierarchy. d. messages pass from computer to computer in a loop.

NIGHT O(297304523) 17:33:49 8. (Points: 1.0) Web 2.0 is the collaborative effort led by the World Wide Web Consortium to add a layer of meaning atop the existing Web to reduce the amount of human involvement in searching for and processing Web information.

TrueFalse 9. (Points: 1.0)

Wi-Fi enables users to freely roam from hotspot to hotspot even if the hotspot is using different WiFi network services.

TrueFalse 10. (Points: 1.0) The most common Ethernet topology is

a. ring. b. star. c. bus d. mesh.

11. (Points: 1.0) A network that spans a city, and sometimes its major suburbs as well, is called a

a. CAN. b. MAN. c. WAN. d. LAN.

12. (Points: 1.0) Bandwidth is the

a. number of frequencies that can be broadcast through a medium. b. number of cycles per second that can be sent through a medium.

c. difference between the highest and lowest frequencies that can be accommodated on a single channel. d. total number of bytes that can be sent through a medium per second.

13. (Points: 1.0) The total amount of digital information that can be transmitted through any telecommunications medium is measured in

a. bps. b. Hertz. c. baud. d. gigaflops.

14. (Points: 1.0) Digital subscriber lines

a. operate over coaxial lines to deliver Internet access. b. are very-high-speed data lines typically leased from long-distance telephone companies. c. have up to twenty-four 64-Kbps channels. d. operate over existing telephone lines to carry voice, data, and video.

15. (Points: 1.0) What service converts IP addresses into more recognizable alphanumeric names?

a. HTML b. DNS

c. IP d. HTTP

NIGHT O(297304523) 17:34:54 16. (Points: 1.0) The child domain of the root is the

a. top-level domain. b. second-level domain. c. host name. d. domain extension. 17. (Points: 1.0) In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?

a. "http://", myspace, blogging, com b. "http://", com, blogging, myspace c. ".", myspace, blogging, com d. ".", com, blogging, myspace (Points: 1.0)

18 .

Which of the following services enables logging on to one computer system and working on another?

a. FTP b. LISTSERV

c. Telnet d. World Wide Web (Points: 1.0)

19 .

A VPN

a. is an encrypted private network configured within a public network. b. is more expensive than a dedicated network. c. provides secure, encrypted communications using Telnet. d. is an Internet-based service for delivering voice communications.

20 .

(Points: 1.0)

What technology allows people to have content pulled from Web sites and fed automatically to their computers?

a. FTP b. RSS c. HTTP d. Bluetooth

21 .

(Points: 1.0)

A network that connects authorized customers, suppliers, and other business partners to portions of a firm's internal network is called a(n)

a. intranet. b. extranet. c. enterprise network. d. virtual private network.

22

(Points: 1.0)

.
Which generation of network are wireless cellular phone systems entering?

a. 2.5G b. 3G c. 3.5G d. 4G

23 .

(Points: 1.0)

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.

a. four b. six c. eight d. ten

24 .

(Points: 1.0)

Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.

25 .

TrueFalse (Points: 1.0)

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

26 .

TrueFalse (Points: 1.0)

Viruses can be spread through e-mail.

27 .

TrueFalse (Points: 1.0)

Computer worms spread much more rapidly than computer viruses.

28 .

TrueFalse (Points: 1.0)

Large amounts of data stored in electronic form are ________ than the same data in manual form.

a. less vulnerable to damage b. more secure c. vulnerable to many more kinds of threats d. more critical to most businesses

29 .

(Points: 1.0)

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that

a. are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. b. are not secure because the technology to secure them did not exist at the time the files were created. c. have the potential to be accessed by large numbers of people and by groups outside of the organization. d. are frequently available on the Internet. (Points: 1.0)

30 .

Specific security challenges that threaten the communications lines in a client/server environment include

a. tapping; sniffing; message alteration; radiation. b. hacking; vandalism; denial of service attacks. c. theft, copying, alteration of data; hardware or software failure. d. unauthorized access; errors; spyware.

31 .

(Points: 1.0)

The Internet poses specific security problems because

a. it was designed to be easily accessible. b. Internet standards are universal. c. everyone uses the Internet. d. it changes so rapidly. (Points: 1.0)

32 .

The main security problem on the Internet is

a. hackers. b. radiation. c. bandwidth theft. d. natural disasters, such as floods and fires. (Points: 1.0)

33 .

Redirecting a Web link to a different address is a form of

a. snooping. b. spoofing. c. sniffing.

d. war driving.

34 .

(Points: 1.0)

How do hackers create a botnet?

a. by infecting Web search bots with malware b. by using Web search bots to infect other computers c. by causing other people's computers to become "zombie" PCs following a master computer d. by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door

35 .

(Points: 1.0)

Phishing is a form of

a. spoofing. b. spinning. c. snooping. d. sniffing.

36 .

(Points: 1.0)

Phishing involves

a. setting up bogus Wi-Fi hot spots. b. setting up fake Web sites to ask users for confidential information. c. pretending to be a legitimate business's representative in order to garner information about a security system. d. using e-mails for threats or harassment.

37 .

(Points: 1.0)

Evil twins are

a. Trojan horses that appears to the user to be a legitimate commercial software application. b. e-mail messages that mimic the e-mail messages of a legitimate business. c. fraudulent Web sites that mimic a legitimate business's Web site. d. bogus wireless networks that look legitimate to users.

38 .

(Points: 1.0)

Biometric authentication

a. is inexpensive. b. is used widely in Europe for security applications. c. can use a person's face as a unique, measurable trait. d. only uses physical traits as a measurement.

39 .

(Points: 1.0)

A firewall allows the organization to

a. enforce a security policy on traffic between its network and the Internet. b. check the accuracy of all transactions between its network and the Internet. c. create an enterprise system on the Internet. d. check the content of all incoming and outgoing e-mail messages. (Points: 1.0)

40 .

________ use scanning software to look for known problems such as bad passwords, the removal of important files, security attacks in progress, and system administration errors.

a. Stateful inspections b. Intrusion detection systems c. Application proxy filtering technologies

d. Packet filtering technologies

41 .

(Points: 1.0)

Currently, the protocols used for secure information transfer over the Internet are

a. SSL, TLS, and S-HTTP. b. TCP/IP and SSL. c. S-HTTP and CA. d. HTTP and TCP/IP.

42 .

(Points: 1.0)

Most antivirus software is effective against

a. only those viruses active on the Internet and through e-mail. b. any virus. c. any virus except those in wireless communications applications. d. only those viruses already known when the software is written.

43 .

(Points: 1.0)

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

a. SSL b. symmetric key encryption c. public key encryption d. private key encryption (Points: 1.0)

44 .

Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.

a. worm b. malware c. none of the above d. all of the above

45 .

(Points: 1.0)

________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.

a. Identity theft b. computer viruses c. none of the above d. all of teh above

46 .

(Points: 1.0)

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user.

47 .

TrueFalse (Points: 1.0)

A Web interface requires changes to the internal database.

48 .

TrueFalse (Points: 1.0)

Common Gateway Interface is a specification for processing data on a Web server.

49 .

TrueFalse (Points: 1.0)

Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.

50 .

TrueFalse (Points: 1.0)

TCO refers to the original cost of purchased technology: both hardware and software.

51 .

TrueFalse (Points: 1.0)

A network that connects authorized customers, suppliers, and other business partners to portions of a firm's internal network is called a(n)

a. intranet. b. extranet. c. enterprise network. d. virtual private network.

52 .

(Points: 1.0)

Computer worms spread much more rapidly than computer viruses.

53 .

TrueFalse (Points: 1.0)

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

54 .

TrueFalse (Points: 1.0)

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.

55 .

TrueFalse (Points: 1.0)

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?

a. total cost of ownership b. return on investment c. breakeven point d. cost benefit analysis

56 .

(Points: 1.0)

Hardware and software acquisition costs account for about ________ percent of TCO.

a. 20 b. 40 c. 60 d. 80

57 .

(Points: 1.0)

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?

a. modality b. scalability c. expandability d. disintermediation (Points: 1.0)

58 .

68) As discussed in the Interactive Session: Technology, what problem was MySpace facing in its data management?

a. program-data dependence b. data redundancy c. scalability d. data quality (Points: 1.0)

59 .

Data cleansing not only corrects errors but also

a. establishes logical relationships between data. b. structures data. c. normalizes data. d. enforces consistency among different sets of data.

60 .

(Points: 1.0)

A(n) ________ view shows data as it is actually organized and structured on the data storage media.

a. manual b. logical

c. physical d. all of the above

61 .

(Points: 1.0)

A(n) ________ is software that handles all application operations between browser-based computers and a company's back-end business applications or databases.

a. application software b. analyze c. server d. application server

62 .

(Points: 1.0)

________ are the formal rules governing the maintenance, distribution, and use of information in an organization.

a. standards b. Information policies c. productures d. all of the above

63 .

(Points: 1.0)

Mass customization is a form of mass production.

64 .

TrueFalse (Points: 1.0)

Strong linkages to customers and suppliers decrease switching costs.

65 .

TrueFalse (Points: 1.0)

An example of synergy in business is

a. Amazon's use of the Internet to sell books. b. JP Morgan Chase's merger with Bank One Corporation, which provided JP Morgan with a network of retail branches in new regions. c. Blockbuster combining traditional video rental with online video rental. d. Wal-Mart's order entry and inventory management system to coordinate with suppliers.

66 .

(Points: 1.0)

Network economics

a. applies the law of diminishing returns to communities of users. b. applies traditional economics to networked users. c. sees the cost of adding new members as inconsequential. d. balances the high cost of adding new members to a community against the lower cost of using network infrastructure. (Points: 1.0)

67 .

Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.

68 .

TrueFalse (Points: 1.0)

Deciding whether to introduce a new product line is the responsibility of an operational manager.

TrueFalse

69 .

(Points: 1.0)

You have been hired by a non-profit agency to implement a system to handle their donations. Event fundraisers need to be able to quickly access a donor's information and history. The marketing department needs to be able to create customized mailing lists, in order to send different messages to different types of donors. What system will best meet these needs?

a. TPS b. TPS with DSS capabilities c. TPS with MIS capabilities d. TPS with ESS capabilities (Points: 1.0)

70 .

Executive support systems are information systems that support the

a. long-range planning activities of senior management. b. knowledge and data workers in an organization. c. decision-making and administrative activities of middle managers. d. day-to-day processes of production. (Points: 1.0)

71 .

Maintaining the organization's financial records is a central purpose of which main business function?

a. manufacturing and accounting b. finance and accounting c. sales and manufacturing d. finance and sales

72 .

(Points: 1.0)

In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is

a. middle management. b. service workers. c. production management. d. operational management.

73 .

(Points: 1.0)

Which of the following are environmental actors that interact with an organization and its information systems?

a. customers b. suppliers c. regulatory agencies d. all of the above

74 .

(Points: 1.0)

From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called

a. the information value chain. b. the IT value chain. c. information processing. d. feedback.

75 .

(Points: 1.0)

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

a. Analog b. Wave c. digital d. all the above

76 .

(Points: 1.0)

Which of the following is NOT one of the main problems with a traditional file environment?

a. data inconsistency b. lack of flexibility in creating ad-hoc reports c. program-data independence d. poor security (Points: 1.0)

77 .

The confusion created by ________ makes it difficult for companies to create customer relationship management, supply chain management, or enterprise systems that integrate data from different sources.

a. batch processing b. data independence c. data redundancy d. online processing

78 .

(Points: 1.0)

What legal mechanism protects the owners of intellectual property from having their work copied by others?

a. patent protection b. intellectual property law c. copyright law d. Fair Use Doctrine

79 .

(Points: 1.0)

Which of the following is not one of the three principal sources of poor system performance?

a. software bugs and errors b. hardware or facility failures caused by natural or other causes. c. insufficient integration with external systems. d. poor input data quality.

80 .

(Points: 1.0)

The logical view

a. shows how data are organized and structured on the storage media. b. presents an entry screen to the user. c. allows the creation of supplementary reports. d. presents data as they would be perceived by end users.

81 .

(Points: 1.0)

DBMSs typically include report-generating tools in order to

a. retrieve and display data. b. display data in an easier-to-read format. c. display data in graphs.

d. perform predictive analysis.

82 .

(Points: 1.0)

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called

a. normalization. b. data scrubbing. c. data cleansing. d. data defining. (Points: 1.0)

83 .

A schematic of the entire database that describes the relationships in a database is called a(n)

a. data dictionary. b. intersection relationship diagram. c. entity-relationship diagram. d. data definition diagram.

84 .

(Points: 1.0)

Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as

a. DSS. b. OLAP. c. data mining. d. business intelligence

85 .

(Points: 1.0)

Data mining is a tool for allowing users to

a. quickly compare transaction data gathered over many years. b. find hidden relationships in data. c. obtain online answers to ad hoc questions in a rapid amount of time. d. summarize massive amounts of data into much smaller, traditional reports.

86 .

(Points: 1.0)

The organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n)

a. information policy. b. data definition file. c. data quality audit. d. data governance policy.

87 .

(Points: 1.0)

The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called

a. data qulity audit. b. database administration. c. information policy administration. d. data auditing.

88 .

(Points: 1.0)

Databases record information about general categories of information referred to as entities.

89 .

TrueFalse (Points: 1.0)

74) DBMS have a(n) ________ capability to specify the structure of the content of the database.

a. data dictionary b. database c. data mining d. data definition

90 .

(Points: 1.0)

A(n) ________ database is one that is stored in more than one physical location.

a. centralized b. decentralized c. distributed d. network

91 .

(Points: 1.0)

In clustering, a data mining tool discovers different groupings within data, such as finding affinity groups for bank cards.

92 .

TrueFalse (Points: 1.0)

________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms.

a. insourcing

b. Outsourcing c. consulting d. all of the above

93 .

(Points: 1.0)

Nanotechnology uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.

94 .

TrueFalse (Points: 1.0)

OODBMS are slower than relational DBMS.

95 .

TrueFalse (Points: 1.0)

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.

96 .

TrueFalse (Points: 1.0)

In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.

97 .

TrueFalse (Points: 1.0)

A data warehouse may be updated by a legacy system.

TrueFalse

98 .

(Points: 1.0)

Software that manages the resources of the computer is called

a. application software. b. data management software. c. operating system software. d. network software. (Points: 1.0)

99 .

The business case for using grid computing involves all of the following EXCEPT

a. increased accuracy. b. cost savings. c. speed of computation. d. agility.

100 .

(Points: 1.0)

Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?

a. on-demand b. grid c. edge d. autonomic

101 .

(Points: 1.0)

The business case for using grid computing involves all of the following EXCEPT

a. cost savings.

b. increased accuracy. c. speed of computation. d. agility.

102 .

(Points: 1.0)

An example of autonomic computing is

a. spyware protection software that runs and updates itself automatically. b. software programmed to run on any hardware platform. c. cell phones taking on the functions of handheld computers. d. programming languages that allow non-programmers to create custom applications.

103 .

(Points: 1.0)

Which type of software is created and updated by a worldwide community of programmers and available for free?

a. software packages b. mashups c. outsourced d. open source

104 .

(Points: 1.0)

Linux is:

a. primarily concerned with the tasks of end users. b. designed for specific machines and specific microprocessors. c. especially useful for processing numeric data. d. an example of open-source software.

105 .

(Points: 1.0)

A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a:

a. JVM. b. FTP client. c. Web browser. d. All of the above.

Вам также может понравиться