This action might not be possible to undo. Are you sure you want to continue?
To succeed in today’s environment, it is often necessary to change business models and strategies. B. IT enables organizations to survive in the face of business pressures. C. IT requires small investments over a long period of time. D. Organizations can leverage their platforms to develop Web-based applications, products, and services. ANS: C REF: Material following chapter opening case The modern business environment has all of the following characteristics except: A. global B. interconnected C. competitive D. relatively static E. real-time ANS: D REF: Material following chapter opening case _____ deal with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing. A. IT architecture B. IT infrastructure C. information technology D. management information systems E. IT services ANS: D REF: 1.1 Information Systems: Concepts and Definitions _____ is (are) data that have been organized to have meaning and value to a recipient. A. data B. information C. knowledge D. experience E. wisdom ANS: B
REF: 1.1 Information Systems: Concepts and Definitions If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then Amazon is applying its _____. A. data B. information C. knowledge D. experience E. wisdom ANS: C REF: 1.1 Information Systems: Concepts and Definitions An organization’s information technology architecture: A. provides a guide for current operations B. provides a blueprint for future directions C. integrates the information requirements of the organization and all users D. is analogous to the architecture of a house E. all of the above ANS: E REF: 1.1 Information Systems: Concepts and Definitions _____ are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services. A. IT components B. IT services C. information technology D. information system E. computer-based information system ANS: A REF: 1.1 Information Systems: Concepts and Definitions An organization’s _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. A. information technology architecture B. information technology infrastructure C. information technology D. information system E. computer-based information system
ANS: B REF: 1.1 Information Systems: Concepts and Definitions _____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information technologies. A. regionalization B. nationalization C. globalization D. business environment ANS: C REF: 1.2 The Global, Web-Based Platform Globalization 1.0 focused on _____, Globalization 2.0 focused on _____, and Globalization 3.0 focuses on _____. A. companies, groups, countries B. countries, groups, companies C. countries, companies, groups D. groups, companies, countries E. groups, countries, companies ANS: C REF: 1.2 The Global, Web-Based Platform _____ enables computer applications to interoperate without human interaction. A. supply-chaining B. informing C. uploading D. work-flow software E. outsourcing ANS: D REF: 1.2 The Global, Web-Based Platform _____ involves taking a specific function that your company was doing itself, having another company perform that same function for you, and then integrating their work back into your operation. A. informing B. insourcing C. offshoring D. outsourcing E. uploading
ANS: D REF: 1.2 The Global, Web-Based Platform _____ means that you can create content and send or post it to the Web. A. informing B. insourcing C. delivering D. participating E. uploading ANS: E REF: 1.2 The Global, Web-Based Platform If your university hires a company to manage its entire human resources function, then your university is practicing _____. A. insourcing B. outsourcing C. offshoring D. temporary hiring E. consulting ANS: B REF: 1.2 The Global, Web-Based Platform The workforce in developed countries has which of the following characteristics? A. more diversified B. more women C. more single parents D. more persons with disabilities E. all of the above ANS: E REF: 1.3 Business Pressures, Organizational Responses, and IT Support Today’s customers have which of the following characteristics? A. less knowledge about products B. less sophistication C. difficulty in finding information about products D. higher expectations E. difficulty in comparing prices ANS: D REF: 1.3 Business Pressures, Organizational Responses, and IT Support
E. procedures When identical items are produced in large quantities, this is called: A. strategic systems B. customer focus C. continuous improvement D. mass production E. mass customization ANS: D REF: 1.3 Business Pressures, Organizational Responses, and IT Support Which of the following is not a fact about IT careers? A. The four-fastest growing U.S. jobs that require college degrees from 2002 through 2012 are ITrelated. B. Highly-skilled IT jobs will typically not be offshored. C. There are no computing jobs. D. MIS majors usually receive high starting salaries. ANS: C REF: 1.4 Why Are Information Systems Important to You? Ans: C Ref: 2.1 Types of Information Systems Which of the following is not a major capability of information systems? A. perform high-speed, high-volume numerical computations B. provide fast, accurate communications among organizations C. store very small amounts of information in a very large space D. increase the effectiveness and efficiency of people working in groups E. automate semiautomatic business processes Ans: C Ref: 2.1 Types of Information Systems Two information systems that support the entire organization are: A. Enterprise resource planning systems, dashboards B. Transaction processing systems, office automation systems C. Enterprise resource planning systems, transaction processing systems D. Expert systems, office automation systems E. Expert systems, transaction processing systems Ans: C Ref: 2.1 Types of Information Systems When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data. A. transaction processing system B. functional area information system C. dashboard D. enterprise resource planning system E. office automation system Ans: A Ref: 2.1 Types of Information Systems Supply chain systems are which type of information system? A. departmental information systems B. enterprisewide information systems C. interorganizational information systems
Chapter 2 Multiple Choice Which of the following statements about information systems is not correct? A. Information systems are concentrated in the IS Department. B. Information systems tend to follow the structure of the organization. C. Information systems are based on the needs of employees. D. Any information system can be strategic. E. Managing information systems is difficult. Ans: A Ref: Discussion immediately following Chapter opening case A collection of related files, tables, and so on that stores data and the associations among them is _____. A. hardware B. software C. database D. network
decision support systems E. physical C. intermediation. primary activities. Procurement. where _____ activities do not add value directly to the firm’s products or services. financial D.2 Competitive Advantage and Strategic Information Systems Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.1 Types of Information Systems Information-based industries are most susceptible to which one of Porter’s five forces? A. competitive opportunities D. support activities Ans: B Ref: 2. primary B. high. Primary. individual information systems Ans: C Ref: Types of Information System _____ attempt to duplicate the work of human experts by applying reasoning capabilities. increases.1 Types of Information Systems _____ provide rapid access to timely information and direct access to structured information in the form of reports. expert systems B. A. A. increases. physical B. high. activities. activities.D. activities C. A. functional area information systems D. A. rivalry among existing firms in an industry Ans: D Ref: 2. dashboards C. inbound logistics C. increasing B. general strategies E. A. Human resource management. bargaining power of customers D.2 Competitive Advantage and Strategic Information Systems For most companies. low C. general strategies. digital E. threat of substitute products E. threat of entry of new competitors B. the Web _____ the threat that new competitors will enter the market by _____ traditional barriers to entry. activities B. dashboards C. A. decreases. decreasing Ans: B Ref: 2.2 Competitive Advantage and Strategic Information Systems The threat of competitors’ entering a market is very high in industries that perform a(n) _____ role. financial. digital Ans: E Ref: 2. end-user computing systems E.2 Competitive Advantage and Strategic Information Systems Porter’s competitive forces model helps organizations identify _____. bargaining power of suppliers C. high E. low.2 Competitive Advantage and Strategic Information Systems _____ activities create value for which customers are willing to pay. functional area information systems D. support 4 . decreases. the same Ans: B Ref: 2. where his value chain model helps organizations identify specific _____. Support. intermediation. the same B. expert systems B. and in industries where the primary product or service is _____. A. sales. competitive opportunities. broker. low. decreasing C. low D. operations D. business intelligence systems Ans: B Ref: 2. increasing D. business intelligence systems Ans: A Ref: 2. low. decision support systems E.
services.4 Managing Information Resources 5 . Primary activities.2 Competitive Advantage and Strategic Information Systems Offering different products. where his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. innovation D.2 Competitive Advantage and Strategic Information Systems Introducing new products and putting new features in existing products is which strategy for competitive advantage? A. cost leadership B. Information resources are expensive to acquire. Ans: C Ref: 2. gives managers time to get into the field B. differentiation C. or product features is which strategy for competitive advantage? A. support activities C. operational effectiveness E. Value chain model. cost leadership B. differentiation C. C. Competitive forces model. D. none of the above Ans: C Ref: 2. competitive forces model B. Value chain model.E. Competitive forces model. innovation D. innovation D. primary activities D. information systems and applications. operational effectiveness E. customer orientation Ans: D Ref: 2. Without their information resources. managers can spend more time planning C. customer orientation Ans: E Ref: 2.2 Competitive Advantage and Strategic Information Systems Porter’s _____ help(s) companies identify general strategies. operate. Information resources typically do not change quickly. customer-orientation Ans: B Ref: 2.2 Competitive Advantage and Strategic Information Systems Improving the manner in which internal business processes are executed is which strategy for competitive advantage? A. differentiation C.2 Competitive Advantage and Strategic Information Systems The impact of IT on managers’ jobs is all of the following except: A. Information resources include all the hardware. cost leadership B. A. support activities Ans: D Ref: 2. B. outbound logistics Ans: D Ref: 2. data. operational effectiveness E. operational effectiveness E.2 Competitive Advantage and Strategic Information Systems Which of the following statements concerning information resources is not correct? A. Accounting. and networks in an organization. managers can gather information more quickly E. innovation D. organizations cannot function.2 Competitive Advantage and Strategic Information Systems When Amazon welcomes you by name back to its Web site on your second visit. cost leadership B. this is an example of which strategy for competitive advantage? A. value chain model E. and maintain. managers must spend more time managing fewer employees D. differentiation C. customer-orientation Ans: C Ref: 2.
a strategic plan C. Size of the organization B. hands-on. transferability D. illegal C. Organization’s attitude towards computing E. B. a goals outline Ans: A Response: 3. a mission statement D. technical D. privacy B. Transaction processing systems B. Maturity level of the organization’s information technologies Ans: C Ref: 2. Executive information systems C. hands-on. The company disclosed the security breach to its customers too quickly. The company did not know which data were stolen and when. accessibility Ans: B Response: 3. managerial. Unethical. A. The company did not know about the breach immediately when it occurred. decision-making E. End-user computing Ans: E Ref: 2. Amount and type of information resources in the organization C. Unethical. The company’s security was originally breached. illegal D. Illegal. accuracy C. Ethical.1 Ethical Issues _____ issues involve collecting. technical Ans: B Ref: 2. property E. privacy B. operational. Management information systems E. The attackers had the company’s encryption key. Organization’s revenue and profits D.1 Ethical Issues _____ issues involve the authenticity and fidelity of information that is collected and processed.4 Managing Information Resources The role of the director of the Information Systems Department is changing from more _____ to more _____.4 Managing Information Resources Dividing the responsibility for developing and maintaining information resources between the Information System Department and end users depends on all of the following except : A._____ is the direct use of information systems by employees in their work. E. Ethical.1 Ethical Issues _____ issues involve who may obtain information and how much they should pay for this information. . A. responsibility charters E. legal Ans: C Response: 3. A. managerial C.4 Managing Information Resources Ans: B Response: Chapter opening case Various organizations that promote fair and responsible use of information systems often develop _____: A. accuracy C. unethical B. Decision support systems D. technical. legal E. transferability D. storing and disseminating information about individuals. property E. a code of ethics B. A.1 Ethical Issues What is _____ is not necessarily _____. C. A. accessibility Ans: A Response: 3. 6 Chapter 3 Which of the following was not one of TJX’s problems? A. managing B. D.
the most important lesson that the company learned was which of the following? A. limited storage capacity on portable devices E. B. lack of due diligence 7 . E. smaller computing devices B. B. The Internet has increased individuals’ privacy. E. Almost anyone can buy or access a computer today.1 Ethical Issues Which of the following statements is correct? A. E. D. Employees have limited protection against surveillance by employers. Encrypt your data. Computer attack programs. C. B. Employees should be aware that surveillance is legal. Ans: D Response: 3. Use biometric identification. C. poor security policies and procedures B. privacy B. D. D. Consistent international privacy and security laws are followed by all countries. downstream liability C. Consistent international privacy and security laws enable information to flow freely among countries. Advances in information technologies have not affected individual privacy. C. C. employers cannot read employee e-mail. It is enough to protect your own internal network. You must take responsibility for the security of your business partners and customers. It is difficult to determine and enforce privacy regulations. due diligence Ans: D Response: 3. Ans: D Response: 3. International privacy and security laws have led to a complex global legal framework. International organized crime is training hackers. An individual’s right to privacy is absolute. Ans : B Response : Threats to Information Security Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. C.A. transferability D.1 Ethical Issues Which of the following statements is not correct? A. Ans: D Response: 3. You must have insurance to cover the costs of a security breach. The large majority of organizations use URL filtering. Your problem is which of the following? A.1 Ethical Issues When Lexis-Nexis suffered a security breach. Ans: B Response: 3. accuracy C. D. International privacy and security laws are very consistent. D. accessibility Ans: E Response: 3. An individual’s right to privacy supersedes the needs of society. B. Consistent international privacy and security laws help companies with their regulatory requirements from country to country. More information systems and computer science departements are teaching courses on hacking so that their graduates can recognize attacks on information assets.1 Ethical Issues Which of the following statements is correct? A. the Internet D. are available for download from the Internet. E. called scripts.1 Ethical Issues Which of the following factors are not increasing the threats to information security? A. As with normal first-class mail. B. Cybercrime is much more lucrative than regular white-collar crime. E. The large majority of organizations monitor employee Internet usage. property E.2 Threats to Information Security The computing skills necessary to be a hacker are decreasing for which of the following reasons? A.
white collar crime – extortion – robbery C. A. marketing D. A.C. compromise Ans: D Response: 3.2 Threats to Information Security Employees in which functional areas of the organization pose particularly grave threats to information security? A. management information systems C. cybercrime – white collar crime – robbery D. control D.2 Threats to Information Security A(n) _____ is any danger to which an information resource may be exposed. vulnerability B. finance. risk C. patent C. human resources. trade secret D. always legal because the dumpster is not owned by private citizens Ans: C Response: 3. downstream liability D. spamming Ans: D Response: 3. private property Ans: C Response: 3. management information systems E. compromise Ans: A Response: 3.2 Threats to Information Security A(n) _____ is intellectual work that is known only to a company and is not based on public information.2 Threats to Information Security _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges. A. patent C. private property notice 8 . risk C. operations management. typically committed for the purpose of identity theft D. vulnerability B. management information systems Ans: B Response: 3.2 Threats to Information Security Dumpster diving is: A. hacking C.2 Threats to Information Security A(n) _____ is a document that grants the holder exclusive rights on an invention for 20 years. human resources. white collar crime – burglary – robbery Ans: C Response: 3. knowledge base E. knowledge base E. finance. social engineering E. users have a lack of information security awareness Ans: C Response: 3. copyright B. robbery – white collar crime – cybercrime B. finance B. cybercrime – robbery – white collar crime E.2 Threats to Information Security A(n) information system’s _____ is the possibility that the system will suffer harm by a threat. A. threat E. copyright B. always illegal because it is considered trespassing B. never illegal because it is not considered trespassing C. reverse social engineering B. A. danger E. A. control D. from highest to lowest. always illegal because individuals own the material in the dumpster E. spoofing D. trade secret D. poor service-level agreements E.2 Threats to Information Security Rank the following in terms of dollar value of the crime.
2 Threats to Information Security _____ are segments of computer code embedded within an organization’s existing computer programs.Ans: B Response: 3. worm Ans: B Response: 3. risk acceptance E.2 Threats to Information Security _____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated. spamware C. back doors E. risk acceptance E. phishing B. Trojan horses D. back doors E. distributed denial-of-service D. and compares the probable costs of each being compromised with the costs of protecting it. A.2 Threats to Information Security In a(n) _____ attack. risk transference 9 . viruses B. brute force dictionary attack Ans: D Response: 3. A. denial-of-service C. distributed denial-of-service Ans: E Response: 3. Trojan horses D. phishing E. risk management B. risk mitigation D. A.3 Protecting Information Resources In _____. a coordinated stream of requests is launched against a target system from many compromised computers at the same time. back door E. risk analysis C. the organization takes concrete actions against risks. worms C. viruses B.2 Threats to Information Security _____ is designed to use your computer as a launch pad for sending unsolicited e-mail to other computers. spyware B. logic bomb Ans: E Response: 3. alien software Ans: C Response: 3. worms C.2 Threats to Information Security _____ uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail. risk mitigation D. back doors E. risk transference Ans: B Response: 3. worms C. risk management B. worm D.2 Threats to Information Security _____ are segments of computer code that attach to existing computer programs and perform malicious acts. A. adware D. risk analysis C. A. virus E. viruses B. estimates the probability that each asset might be compromised. A. Trojan horses D. A. zero-day attack B. that activate and perform a destructive action at a certain time or date. A.2 Threats to Information Security _____ is the process in which an organization assesses the value of each asset being protected. alien software Ans: A Response: 3. denial-of-service C.
risk analysis C.3 Protecting Information Resources Which of the following statements is not correct concerning the difficulties in protecting information resources? A. A. decreasing amount of external data needs to be considered D.1 Managing Data Place the following members of the data hierarchy in the correct order: A. E. application/data dependence Ans: B Ref: 4. Data isolation B.3 Protecting Information Resources _____ controls restrict unauthorized individuals from using information resources and are concerned with user identification. data security controls D. Application/data dependence 10 .Ans: C Response: 3.database Ans: D Ref: 4. data redundancy E. data are stored in the same format throughout organizations Ans: B Ref: 4. should not be a recognizable string of numbers E. byte – bit – record – field – database D. Employees typically do not follow security procedures when the procedures are inconvenient. the organization purchases insurance as a means to compensate for any loss. D.3 Protecting Information Resources In _____. bit – byte – field – record – file/table – database E. bit – record – field – byte – file/table -. Computer networks can be located outside the organization. A. Rapid technological changes ensure that controls are effective for years. data integrity C. B.2 The Database Approach _____ occurs when the same data are stored in many places. Ans: C Response: 3. physical controls C. amount of data stays about the same over time B. risk transference Ans: E Response: 3. risk management B. data isolation B. data consistency D. A. access controls B. C. bit – field – byte – record – file/table – database C. should be shorter rather than longer so the password can be remembered Ans: E Response: 3. administrative controls E. risk acceptance E. should contain special characters C.2 The Database Approach Verifying that no alphabetic characters are in a Social Security Number field is an example of _____ : A. Computing resources are typically decentralized. Data redundancy E. data are scattered throughout organizations C.3 Protecting Information Resources Which of the following is not a characteristic of strong passwords? A. Computer crimes often remain undetected for a long period of time. input controls Ans: A Response: 3. risk mitigation D.3 Protecting Information Resources Chapter 4 Multiple Choice It is very difficult to manage data for which of the following reasons? A. Data integrity C. should not be a recognizable word D. Data consistency D. bit – byte – field – record – database – file/table B. should be difficult to guess B. data security is easy to maintain E.
secondary key Ans: B Ref: 4. Data isolation B. many-to-many E. database Ans: A Ref: 4. Provide information on each record B.Ans: D Ref: 4. Define the format necessary to enter data into the database D. file E. Records D.3 Database Management Systems Data dictionaries perform all of the following functions except: A. Data redundancy E. some-to-many Ans: D Ref: 4.2 The Database Approach As an individual student in your university’s student database. Data consistency D. identify duplicated data D. Provide information on why fields/attributes are needed in the database C. specify an entity B. Data integrity C. file B. Provide information on how often fields/attributes should be updated Ans: A Ref: 4. you are a(n) _____ of the STUDENT class. primary key E. every row represents a _____: A. Rows C.2 The Database Approach In the relational database model. number. data manipulation language (DML) 11 . A. Oracle C. or symbol.2 The Database Approach _____ occurs when various copies of the data agree. A. entity E. record C.3 Database Management Systems A standardized language used to manipulate data is _____: A.2 The Database Approach A(n) _____ represents a character. A. one-to-one B. many-to-one D. relationship Ans: A Ref: 4. individual C. Application/data dependence Ans: C Ref: 4. MS-Access B.3 Database Management Systems In a relational database. Files B. record D. uniquely identify a record E.2 The Database Approach In a database. related tables can be joined when they contain common _____. A. Columns/Fields Ans: D Ref: 4. such as a letter. query-by-example language D. students can take more than one class. attribute D. instance B. field C.2 The Database Approach At Umass. byte B. This is an example of what kind of relationship? A. Provide information on name of fields/attributes E. one-to-many C. structured query language (SQL) E. uniquely identify an attribute Ans: D Ref: 4. the primary key field is used to _____: A. and each class can have more than one student. create linked lists C. representative D.
Primary key D.4 Data Warehousing The process of moving data from various sources into the data warehouse is called: A.Ans: D Ref: 4. and reporting _____ knowledge.3 Database Management Systems _____ is a method for analyzing and reducing a relational database to its most streamlined form. fields/attributes in the table depend only on the _____. Enterprise information management Ans: D Ref: 4. Data governance E. Data warehouse B. Common record B. Data mart Ans : D Ref : Data Governance Difficulty : Easy _____ provides companies with a single version of the truth for their data. A. all of the above Ans: D Ref: 4. but not users Ans: C Ref: 4. tacit B. Common row Ans: C Ref: 4. Database management B. Are available for MIS analysts. Enterprise information management C. managing. knowledge management C. Are updated constantly in real time B. reduce data inconsistency B. approximately once per day C. transfer. Joining E. Relational analysis Ans: B Ref: 4. A. make it easier to modify data and information D. Are purged constantly as new data enter E.3 Database Management Systems Data dictionaries provide which of the following advantages to the organization? A.6 Knowledge Management Historically. Extract. managerial 12 . Master data management E. Normalization C. organize. Are updated in batch mode.3 Database Management Systems When data are normalized. and apply expertise that are part of the organization’s memory and typically reside inside the organization in an unstructured manner. Query by example D. Master data management E. A. A. data mining Ans: B Ref: 4. Are not updated D.3 Database Management Systems The data in a data warehouse: A. explicit C. online analytical processing E. Database D. Data warehousing D. load C. provide for faster program development C. disseminate.5 Data Governance _____ is a process that helps organizations identify. A. Online transaction processing D. management information systems have focused on capturing. Common attribute C. decision support D. select. Online analytical processing Ans: B Ref: Data Warehousing _____ is a formal approach to managing data consistently across an entire organization. storing. Structured query B. Upload B. A. discovery B. transform. Data mart C.
none of the above Ans: A Response: 5. Industrywide B. Web services E. geographical E. Collaboration D. stays about the same B. computer applications. Improved morale E. quadruples E. More efficient product development Ans: B Ref: Knowlege Management Chapter 5 Multiple Choice Fundamental points about network computing in organizations include all of the following except: A. triples Ans: C Response: 5. cultural Ans: B Ref: 4. Web services E. enable companies to share hardware. Improved customer service B. Networks can be of any size. Communications C. Computers constantly exchange data B. discovery B. Networks support new ways of doing business Ans: D Response: Material immediately following chapter opening case Networks enable which of the following applications? A. Discovery B. enables users to access information located in databases all over the world. Discovery B. and data C. Personal 13 . Collaboration D. _____. A. A. communications C. Communications C.1 Network Applications _____ portals offer content for diverse communities and are intended for broad audiences. None of the above Ans: A Response: 5. Retention of scarce knowledge if employees retire D. doubles D. A. Computer data exchange provides significant advantages to organizations C. Make best practices available to employees C. all of the above Ans: E Response: Material immediately following chapter opening case The network application. enable organizations to be more flexible B.6 Knowledge Management The most important benefit of knowledge management systems is: A. decreases C.1 Network Applications The amount of information on the Web _____ approximately each year.D.1 Network Applications Search engines and metasearch engines are examples of which network application? A. All of the above Ans: E Response: Material immediately following chapter opening case Which of the following are advantages of computer networks? A. enable geographically dispersed employees to work together D. provide a critical link between businesses and their customers E. Networks have had limited impact on organizational productivity E.Web services E. from small to enormous D. collaboration D.
Creation of Web sites B. Collaboration D.0 sites 14 . A. groupware. Commercialization of the Web D. Web 1. Commercial Ans: C Response: 5. free up time for busy managers C. A. Industrywide B. all of the above Ans: E Response: 5.0 Users typically have little interaction with _____. chat room D. Affinity portals B.1 Network Applications Many organizations have implemented corporate portals for which of the following reasons? A. Communications C. Teleconference E. Personal C. to cut costs B. A and C Ans: E Response: 5. Chat room D.1 Network Applications Workflow. None of the above Ans: A Response: 5.1 Network Applications With _____. Internet relay chat Ans: B Response: 5. commercial Ans: D Response: 5. teleconference E. Affinity D.1 Network Applications _____ portals support communities such as hobby groups or a political party. personal C.1 Network Applications With _____. and telepresence systems are examples of which network application? A. affinity D. Discovery B. A. Commercial Ans: E Response: 5. voice over IP B.1 Network Applications Portals are an example of which network application? A. improve profitability D.C.1 Network Applications _____ portals coordinate content within relatively narrow organizational and partners’ communities. None of the above Ans: C Response: 5.1 Network Applications Key developments of the first generation of the Web were: A. Web services E. phone calls are treated as just another kind of data. plain old telephone service C. Voice over IP B. Corporate E. Plain old telephone service C. A and B E. offer customers self-service opportunities E. Corporate E.2 Web 2. Collaboration C. which provide information that users receive passively. corporate E. Internet relay chat Ans: A Response: 5. Web services E. A. Discovery B. Communications D. Heavy user interactivity with Web sites C. publishing B. A. every call opened up a dedicated circuit for the duration of the call. Affinity D.
A. Wikis E. Podcast. AJAX B. Blog B.2 Web 2. Really simple syndication D. Wikis E.0 Only the author may make changes to a(n) _____. Tagging C.0 A process that allows users to place information in multiple. without having to surf thousands of Web sites. AJAX B.2 Web 2.2 Web 2. Really simple syndication Ans: C 15 . AJAX B. Affinity portal D. Affinity portals E. Mashups C. Tagging C.0 sites Ans: B Response: 5. Wiki Ans: C Response: 5.2 Web 2. Really simple syndication D. Videocast E. Podcast. Blog. in the form of text. and opinions is called _____. Podcasting E.2 Web 2. Social networking D. Wiki D.C. Blogging Ans: A Response: 5. Blog C.2 Web 2. feelings. Podcast D. Tagging C. A. Really simple syndication feed B. A. A. really simple syndication feed E. images. A.0 _____ Web sites allow users to upload their content to the Web. Web 2. Really simple syndication D. A. Wiki C. voice.2 Web 2. Web 3. A. blog Ans: B Response: 5. Wikis E. overlapping associations is called _____. where anyone can make changes to any content on a(n) _____. Tagging C. Wiki C. Podcast Ans: B Response: 5. Wiki. AJAX B.0 A Web site on which anyone can post material and make changes to other material is a(n) _____.0 A(n) _____ is a digital audio file that is distributed over the Web for playback on portable media players or personal computers. really simple syndication feed B. Really simple syndication feed E.0 Difficulty: Easy A process that enables users to create a personal Web site containing his or her thoughts. Blogging D.0 _____ is a Web development technique that allows portions of Web pages to reload with fresh data rather than requiring the entire page to reload. Really simple syndication Ans: E Response: 5.2 Web 2. Aggregators B. and videos. A. Wikis E.0 _____ allows users to receive customized information when they want it. Blogging Ans: E Response: 5. Blogging Ans: B Response: 5. Blog.0 sites D.
2 Web 2. A. Wikis E. FaceBook C. Social networks C. Webcrawlers Ans: B Response: 5.2 Web 2. and integration E. LinkedIn E.2 Web 2.Response: 5. A.0 _____ are Web sites that provide collections of content from all over the Web. Twitter Ans: D Response: 5. Flickr D.2 Web 2. discovery.2 Web 2. Aggregators B. Really simple syndication Ans: A Response: 5. Social networks C. Hypertext markup language (HTML) Ans: A Response: 5. Aggregators B. Universal description.0 .2 Web 2. Extensible markup language (XML) B. Social networks C.0 A particularly valuable business-oriented social networking site is: A. Corporate portals E. Universal description. Extensible markup language B. A.0 ChicagoCrime is a Web site that combines the Chicago Police Department’s crime-report information with Google Maps to provide a guide to crime in Chicago. Portals B. A. Universal description. discovery. Mashups D. Web services description language D. Simple object access protocol C. Corporate portals E. Web services description language (WSDL) D. Simple object access protocol C. MySpace B. Hypertext markup language Ans: C Response: 5. delivered over the Internet.2 Web 2.0 _____ is used to create the document that describes the tasks performed by various Web services. Simple object access protocol C. Corporate portals E.2 Web 2.0 _____ is a set of rules that define how messages can be exchanged among different network systems and applications. A.0 _____ is a protocol that makes it easier to exchange data among a variety of applications and to validate and interpret such data.0 site? A. Web services description language D. and integration E. Aggregators B. A. Mashups D.0 A(n) _____ is a Web site that takes content from other Web sites and puts it together to create a new type of content. that use shared protocols to interoperate without human intervention. Hypertext markup language Ans: B Response: 5.2 Web 2. ChicagoCrime is an example of which kind of Web 2. Extensible markup language B. Mashups D. and integration (UDDI) E. Web services C. Really simple syndication Ans: C Response: 5.0 16 _____ are applications. Service-oriented architectures D. discovery. Really simple syndication Ans: C Response: 5.
consumer-to-consumer C. consumer-to-business D.The benefits of e-learning include which of the following? A.3 E-Learning and Distance Learning Which of the following is not a disadvantage of telecommuting for employees? A. A. consumer-to-consumer C. companies are having difficulty integrating their physical and electronic channels Ans: E Response: Material immediately following chapter opening case Electronic commerce provides opportunities to do all of the following except: A. the increase in the number of digitizable products E. government-to-business Ans: A Response: 6. the diversity of EC-related products and services D.1 Overview of E-Business and ECommerce In this type of e-commerce. consumer-to-consumer D. business-to-consumer E. current. new business models C.1 Overview of E-Business and ECommerce Direct payment of Social Security benefits is an example of which type of e-commerce? A. no workplace visibility E. possible loss of fringe benefits C. consumer-to-business D. increased content retention B. government-to-citizen B. consumer-to-consumer C. For companies to expand at relatively high cost C.1 Overview of E-Business and ECommerce If you are an employee managing your fringe benefits over your company’s intranet. consistency D. an organization provides information and services to its workers. business-to-employee B. flexibility E. business-to-business D. business-to-consumer C. business-to-consumer E. A. business-to-business Ans: A Response: 6. For companies to expand their reach B. new online companies B. government-to-citizen Ans: D 17 Chapter 6 Multiple Choice The nature of business competition is changing drastically as a result of all of the following except: A. high-quality content C. you are engaging in which of the following? A. consumer-to-business Ans: C Response: 6. business-to-consumer E. slower promotions Ans: A Response: 5. all of the above Ans: E Response: 5. lower pay (in some cases) D. business-to-business B. decreased feelings of isolation B. government-to-citizen B. For companies to put rich information on their Web sites D. the sellers and buyers are organizations.4 Telecommuting Response: Material immediately following chapter opening case In this type of e-commerce. business-to-employee E. For companies to adopt new business models Ans: B . For companies to increase market share E.
1 Overview of E-Business and ECommerce In _____ auctions. static C. consumer-to-consumer C. Retailers will provide fewer product details to avoid information overload for customers D. name-your-own-price D. electronic tendering system C. name-your-own-price D. simple Ans: C Response: 6. business-to-employee B. static C. affiliate marketing Ans: E Response: 6. business-to-employee B. then vendor pays commissions to partners. This is which business model? A. physical E. A. forward B.1 Overview of E-Business and ECommerce 15.Response: 6. business-to-business D. reverse D. reverse D. simple Ans: A Response: 6. Shopping carts are often abandoned after unsuccessful online searches C.to-business D. none of the above Ans: C Response: 6. find-the-best-price B. reverse D.1 Overview of E-Business and ECommerce In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? A. forward B. eBay uses a _____ auction. online direct marketing E.1 Overview of E-Business and ECommerce Which of the following statements regarding the relationship between electronic commerce and search is not correct? A. Customers will be able to find the closest store offering the product that they want E. static C. Suppliers submit bids and the lowest bid wins. A. online direct marketing E. there is one buyer who wants to buy a product.3 Business-to-Business (B2B) Electronic Commerce Which type of electronic commerce does Amazon practice? A. electronic tendering system C. business-to-consumer E. Customers will have more relevant product information in the near future Ans: C Response: 6.1 Overview of E-Business and ECommerce 16. consumer-to-consumer C. find-the-best-price B. If customers click on logo. affiliate marketing Ans: B Response: 6. A. _____ auctions employ a request for quotation. consumer.1 Overview of E-Business and ECommerce Which type of electronic commerce is the largest by volume? A. physical E.1 Overview of E-Business and ECommerce Vendors ask partners to place logos or banners on partners’ site. physical E. business-to-consumer 18 . simple Ans: C Response: 6. Purchases often follow successful online searches B. forward B. go to vendor’s site and buy.
2 Business-to-Consumer (B2C) Electronic Commerce When Ford Motor Company decided to avoid direct online sales. you can buy from home. disintermediation E. intrabusiness D. Buy-side marketplaces D. Vertical exchanges C.E. vertical exchanges C. state sales taxes Ans: C Response: 6.2 Business-to-Consumer (B2C) Electronic Commerce This type of e-commerce is known as e-tailing. A. Functional exchanges E. Horizontal exchanges B. you can compare competitor’s products and prices E. A. A. the company was trying to eliminate which of the following? A. A. consumer-to-business Ans: D Response: 6. business-to-business B. horizontal exchanges B. D. Ans: C Response: 6. takes time for payment in the mail C. this is called _____. cash cannot be used because there is no face-toface contact B. sell-side marketplaces Ans: B Response: 6. channel integration E. You can find unique items. you can obtain detailed information on products D. buy-side marketplaces D.2 Business-to-Consumer (B2C) Electronic Commerce Which of the following is not an advantage of etailing? A. you have just a few products to choose from C. functional exchanges E. You typically cannot access additional information. disintegration B. You have a wider variety of products to choose from.2 Business-to-Consumer (B2C) Electronic Commerce When middlemen are eliminated in a fully automated electronic commerce transaction. direct sales D.3 Business-to-Business (B2B) Electronic Commerce Which of the following is not a limitation of traditional payment methods in electronic commerce? A. You can easily compare prices and features. 7 days per week. value-added services Ans: D Response: 6. channel conflict D. collaborative commerce C. C. E. federal sales taxes B. 24 hours per day B. so you do not have information overload. customer irritation C. business-to-consumer E. direct and indirect materials in one industry are purchased on an as-needed basis. B. employee-to-business Ans: D Response: 6. all of the above Ans: B Response: 6. supply chain integration C. You can buy from home 24 hours per day.2 Business-to-Consumer (B2C) Electronic Commerce In _____.3 Business-to-Business (B2B) Electronic Commerce _____ connect buyers and sellers across many industries and are used mainly for indirect materials. Sell-side marketplaces Ans: A Response: 6. not all organizations accept credit cards 19 .2 Business-to-Consumer (B2C) Electronic Commerce The advantages of B2C for consumers include all of the following except: A.
Electronic cash D. Domain fraud Ans: C Response: 6.4 Electronic Payments _____ contain a chip that can store information and can be used for several purposes. person-to-person payments Ans: B Response: 6. Electronic cash D. Cybersquatting E. Domain fraud Ans: D Response: 6. Electronic credit cards C. Purchasing cards D. purchasing cards D. Smart cards E. Stored-value money cards C.5 Ethical and Legal Issues in E-Business _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. Stored-value money cards C. A.5 Ethical and Legal Issues in E-Business Chapter 7 Multiple Choice Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? A.4 Electronic Payments A form of e-cash. A.D. with a signature in digital form. Electronic wallet E. electronic checks B. transmitted electronically over the Internet. Domain masquerading C. Cybersquatting E. Domain spoofing B. To become more efficient C. Purchasing cards D. A. A. Electronic checks B. Electronic checks B. A. Electronic credit cards C. To be able to allocate working time around personal and professional obligations E. Electronic debit cards Ans: A Response: 6.4 Electronic Payments _____ use credit card numbers.4 Electronic Payments _____ are a payment mechanism similar to regular bank checks but transmitted electronically. Electronic wallet E. to pay for goods and services and are encrypted A.4 Electronic Payments _____ are typically used for unplanned B2B purchases for amounts under $2000. smart cards E. stored-value money cards C. none of the above Ans: D Response: 6. A.4 Electronic Payments The practice of using similar but not identical domain names is called _____. Domain tasting D. Electronic checks B. Electronic checks B. All of the above 20 . To make use of time that was formerly wasted B. it is more secure for the buyer to use the telephone than to complete a secure transaction on a computer E. _____ allows you to store a fixed amount of prepaid money and then spend it as necessary. Work locations are more flexible D. Domain masquerading C. Smart cards E. Domain spoofing B. Electronic debit cards Ans: B Response: 6. Person-to-person payments Ans: D Response: 6. Person-to-person payments Ans: C Response: 6. Domain tasting D.
1 Wireless Technologies _____ is a satellite-based tracking system that enables the determination of a person’s position.1 Wireless Technologies The greatest problem with GEO satellites is which of the following? A.2 Wireless Computer Networks and Internet Access Microwave transmission systems are used for _____ volume. Propagation delay B.2 Wireless Computer Networks and Internet Access _____. line-of-sight C. short message service D. Size of footprint E. Bluetooth B. Radio waves are slow E. High. Footprint D.2 Wireless Computer Networks and Internet Access 21 . wireless application protocol C. Radio waves cannot travel through walls B. When you travel too far from the source.1 Wireless Technologies _____ is a wireless standard that enables temporary. broadcast B. Wi-Fi E.Ans: E Response: 7. Near field communications B. _____ communications. A. Coverage C. long. the signal fades C. with the shortest range of any wireless network. long. line-of-sight Ans: E Response: 7. short-range connection between mobile devices. short. Bluetooth C. short message service D. long. _____ distance. short. broadcast D. Orbital life D.1 Wireless Technologies The main problem with radio transmission is which of the following? A. Devices are expensive to install Ans: B Response: 7. High. is designed to be used with contactless credit cards. geostationary D. A. A. Hotspot B. Ultra-wideband D. equatorial orbit Ans: C Response: 7. Zone E. A. wi-fi E. Relative speed with respect to a point on the earth’s surface Ans: A Response: 7. Expense C. A. Bluetooth B.1 Wireless Technologies Which type of satellite has the largest footprint? A. High. Infrared Ans: A Response: 7. wireless application protocol C. Low.1 Wireless Technologies The area of the earth reached by a satellite’s transmission is called _____. low earth orbit B. polar orbit E. wi-fi E. global positioning system Ans: A Response: 7. Devices are difficult to install D. Wireless area Ans: C Response: 7. medium earth orbit C. broadcast E. Low. global positioning system Ans: E Response: 7.
increasing prices D.3 Mobile Computing and Mobile Commerce Which of the following is not a mobile application in financial services? A. Laptop PCs can contain chips that send and receive Wi-Fi signals. D. Wi-Fi is expensive to set up. no need for a PC Ans: C Response: 7. 872.11a/b B. wireless electronic payment systems D. B. transceiver B. Ultra-wideband E. hotspot C. localization of products and services Ans: E Response: 7.2 Wireless Computer Networks and Internet Access _____ communicate via radio waves using radio antennas placed within adjacent geographic areas. Satellite D.11g/n C. 702. mobility E. Broad reach. Security. ubiquity B. wireless wallets Ans: A 22 . widespread availability of mobile devices B. local reception D. lack of expense C. mobile banking C. A. Many companies offer free Wi-Fi access in their stores. Bluetooth B.2 Wireless Computer Networks and Internet Access Mobile computing has two major characteristics that differentiate it from other forms of computing. personalization E. 555.11g/n E. localization Ans: A Response: 7.11c D. most wireless local area networks use the _____ standard. A. instant connectivity D. Mobility. GPS location Ans: B Response: 7. A. C. Cell phones C. E. broad reach D. transaction processing systems B.2 Wireless Computer Networks and Internet Access Today. Ans: E Response: 7.2 Wireless Computer Networks and Internet Access A small geographical perimeter within which a wireless access point provides service to a number of users is called: A. _____ means that knowing where a user is physically is a key to offering relevant products and services. Wi-Fi provides simple Internet access. broad reach B. convenience C. Security. What are these two characteristics? A.Which of the following statements about Wi-Fi is not correct? A. 802. Mobility.3 Mobile Computing and Mobile Commerce With regard to mobile computing.3 Mobile Computing and Mobile Commerce The development of mobile commerce is driven by all of the following factors except: A. wireless network E. Wi-Fi requires encryption for secure transmissions. Wi-Max Ans: D Response: 7. micropayments E. which can transmit up to 54 Mbps and has a range of about 300 feet. bandwidth improvement E. the cell phone culture C. Near field communications Ans: B Response: 7.
radio-frequency identification (RFID) E. Eavesdropping D. A. E. war dialing B.4 Pervasive Computing Which of the following is not a problem with bar codes? A. B. Ultra-wideband networks C. war cracking E. A.5 Wireless Security A(n) _____ allows unauthorized entry into a wireless network.3 Mobile Computing and Mobile Commerce The generic term for technologies that use radio waves to automatically identify individual items is: A. C. wireless wallet D. war driving C. A. wireless access point (WAP) Ans: D Response: 7. RF jamming 23 .3 Mobile Computing and Mobile Commerce Parking meters that you can pay via your mobile telephone is an example of: A. D. viral marketing B. Rogue access point Ans: E Response: 7.4 Pervasive Computing The act of locating wireless local area networks while moving around a city is called: A. a person or a device intentionally or unintentionally interferes with your wireless network transmissions. War chalking E.4 Pervasive Computing _____ collect data from many points over an extended space. Disgruntled employee C.5 Wireless Security _____ refers to efforts by unauthorized users to access data traveling over wireless networks. Installing rogue access points Ans: C Response: 7. A. but not the actual item. War driving C. They require line-of-sight. shipping labels D. Wi-Fi networks Ans: C Response: 7. direct marketing Ans: D Response: 7. Illegal server E.5 Wireless Security In _____.3 Mobile Computing and Mobile Commerce Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of: A. They can be ripped or soiled. Open node D. They are expensive. mobile banking B. war chalking Ans: B Response: 7. They identify the manufacturer and product. RF jamming B. wireless electronic payment C. Wi-Max networks E. money transfer Ans: B Response: 7. telemetry B. They do not provide enough data. Wireless sensor networks D. Lack of encryption B. location-based advertising E. geographical advertising D. war hacking D. permission advertising C. Bluetooth networks B. Ans: D Response: 7. brokerage service E.Response: 7. bar codes C.
megabyte – kilobyte – gigabyte – terabyte B.2 The Central Processing Unit Which of the following is not a component of the central processing unit? A. word length C. Increase slowly D. Data to be processed by the CPU B. Double every year B. Installing rogue access points Ans: A Response: 7.3 Computer Memory 24 Technology Guide 1 Multiple Choice Which of the following is not a component of hardware? A. Decreasing line width B. Communication technologies Ans: B Ref: TG1. Control unit C. Operating system programs E.3 Computer Memory Arrange in the correct sequence. None of the above Ans: C Ref: TG1. War driving C. Input and output technologies D.2 The Central Processing Unit Gordon Moore (with Moore’s Law) predicted that microprocessor complexity would do which of the following? A. The operating system C. bandwidth Ans: A Ref: TG1. from smallest to largest: A. All of the above Ans: E Ref: TG1. All of the above Ans: E Ref: TG1. The speed of the computer C. Eavesdropping D. Arithmetic-logic unit Ans: C Ref: TG1. A. The cost of the computer D. Double every two years C. Decrease rapidly . megabyte – terabyte – kilobyte – gigabyte E. Registers B. Putting more transistors on the chip E. kilobyte – megabyte – gigabyte – terabyte D.5 Wireless Security Ans: B Ref: TG1.2 The Central Processing Unit The amount and type of memory that a computer possesses affects which of the following? A. Decrease slowly E. Instructions for the CPU as to how to process the data C. kilobyte – megabyte – terabyte – gigabyte C. Archival data D. Central processing unit E. Secondary storage D.3 Computer Memory Which of the following is not stored in primary storage? A.2 The Central Processing Unit Increased microprocessor complexity comes from which of the following? A. The cost of processing data E. bus width D. The type of program the computer can run B. Using new materials for the chip that increase conductivity D. Increasing transistor miniaturization C. War chalking E. line width E. clock speed B.B. kilobyte – gigabyte – megabyte – terabyte Ans: C Ref: TG1.2 The Central Processing Unit The _____ is measured in megahertz or gigahertz. Primary and secondary storage B.
flash memory Ans: B Ref: TG1. permanent C. is an architecture for building dedicated networks that allow rapid and reliable access to storage devices by multiple servers. nonvolatile. Registers C. flash memory Ans: A Ref: TG1. Secondary storage E. volatile. cache memory D. links groups of hard drives to a specialized microcontroller. temporary B. registers E. A. Nonvolatile B. A. permanent E. closest to the CPU where the computer can temporarily store blocks of data used most often is called A. read-only memory B. Random access memory B. temporary D. random access memory C. Primary storage Ans: A Ref: TG1. registers E. Storage area network (SAN) C.3 Computer Memory Which of the following is not a type of primary storage? A. Can utilize a variety of media E. random access memory D.3 Computer Memory Random access memory is _____ and _____. a type of enterprise storage system. which coordinates the drives so they appear to be a single. read-only memory B. More cost effective than primary storage C. registers C. volatile. read-only memory B.3 Computer Memory _____. Flash memory D. Slower than primary storage D. Read-only memory E. flash memory Ans: D Ref: TG1. Network-attached storage (NAS) D. nonvolatile. Cache memory Ans: C Ref: TG1.3 Computer Memory The part of primary storage that holds a software program (or portion of it) and small amounts of data when they are brought from secondary storage is called A. cache memory E.3 Computer Memory The type of primary storage. Redundant array of independent disks (RAID) B. Read-only memory E. All of the above Ans: E Ref: TG1. A.3 Computer Memory _____. cache memory D. random access memory C.3 Computer Memory Secondary storage has which of the following characteristics? A. Redundant array of independent disks (RAID) 25 . a type of enterprise storage system. None of the above Ans: A Ref: TG1. logical drive. Random access memory C. Cache D. Register B.Which of the following is not a type of primary storage? A.3 Computer Memory The type of primary storage where certain critical instructions are safeguarded because the storage is nonvolatile and the instructions can be read only by the computer and not changed by the user is called A. Optical Storage Ans: E Ref: TG1.
virtualization C. microcomputer/personal computer E. mainframe C. Hardware costs have decreased B. server farm B. To support the large number of transactions caused by electronic commerce B. complex. Microsoft Office Suite B. A.1 Significance of Software The set of computer programs used to manage hardware resources is called A. systems software E. Building software applications remains slow. midrange computer D. active badge Ans: C Ref: TG1. To simplify administration of IT resources D. A. Nanotechnology B. supercomputer B. To improve system performance E. grid computing D. personal application software 26 . Storage area network (SAN) C. None of the above Ans: D Ref: TG1. software comprises a larger percentage of the cost of modern computer systems than it did in the early 1950s for which of the following reasons? A. personal computer E.6 Innovations in Hardware Utilization Technology Guide 2 Multiple Choice Today. A. Edge computing Ans: A Ref: TG1. supercomputer D.6 Innovations in Hardware Utilization _____ refers to the creation of materials.3 Computer Memory To model the weather or simulate nuclear weapons testing. and error-prone E. To reduce the total cost of ownership of distributed systems C. Software has become increasingly complex D. Network-attached storage (NAS) D. the Internet Ans: D Ref: TG1. and systems on a scale of billionths of a meter. Very-large scale integration D. you would most likely use a A. mainframe C.4 Computer Hierarchy Many firms are recentralizing their applications to mainframes for which of the following reasons? A. midrange computer D. microcomputer E.4 Computer Hierarchy A _____ is used in large enterprises for extensive computing applications that are accessed by thousands of concurrent users.4 Computer Hierarchy A _____ is the least expensive general-purpose computer. devices. mainframe computer B. supercomputer B. laptop computer Ans: B Ref: TG1. Secondary storage E. utility/subscription computing E. all of the above Ans: E Ref: TG1. All of the above Ans: E Ref: TG2. application software C. workstation C. Utility computing E. Primary storage Ans: B Ref: TG1.B. Hardware performance has increased C. Ultra-large scale integration C. A. general software D. a service provider makes computing resources and infrastructure management available to a customer as needed.4 Computer Hierarchy In _____.
Multithreading B. General application software C. Scalability E. Multiprocessing Ans: E _____ are programs that sort records. A. fraud. Multithreading B. General application software C. transaction processing software B. Multitasking C. is more flexible in making modifications C.2 Systems Software _____ occurs when a computer system with two or more processors runs more than one program. systems software E. at a given time by assigning them to different processors. System performance monitors E. Multiprocessing Ans: A Ref: TG2. Time-sharing D. Allocates CPU time and main memory to programs running on the computer B. System performance monitors E. A. Supervises the overall operation of the computer D. general software D.2 Systems Software Ans: D Ref: TG2. None of the above Ans: D Ref: TG2. Provides an interface between the user and the hardware C. System security monitors Ans: A Ref: TG2. application software C. and manage memory usage. Application service providers Ans: C Ref: TG2.3 Application Software Off-the-shelf software _____. create directories and sub-directories. System utilities B. restore accidently deleted files. Contract software E.3 Application Software Which of the following is not a factor in the selection of software? 27 . A. System security monitors Ans: E Ref: TG2. Outsourcing B. A. is rarely tested prior to release Ans: A Ref: TG2. Time-sharing D.Ref: TG2. Scalability E.2 Systems Software Creating specific application software using an organization’s own resources is called what? A. or thread. microcode Ans: B Ref: TG2. may not match an organization’s current work processes and data B. and destruction. Personal application software D.1 Significance of Software The set of computer instructions that provides specific functionality to a user is called A. requires more risk because all features and performance are not known D. A. Increases the complexity of the system to the user E. Consultant-based development C.2 Systems Software _____ are programs that protect a computer system from unauthorized use. Multitasking C. In-house development D.1 Significance of Software Which of the following is not a function of the operating system? A.2 Systems Software _____ means that several parts of the same application can work simultaneously. System utilities B. Personal application software D.
Internet-based distribution methods Ans: C Ref: TG2. Java E. Open source software Ans: B Ref: TG2. embedded graphics D. Shareware C. reusable data C. Freeware B.4 Software Issues _____ is software whose source code is available at no cost to developers and users. Open systems D. messages E. A. no errors Ans: A Ref: TG2. encryption B.4 Software Issues _____ is software that typically allows no access to the underlying source code. Runs slower than comparable vendor-developed software Ans: E Ref: TG2. System capabilities Ans: B Ref: TG2.4 Software Issues Which of the following is not an advantage of opensource software? A. Software-as-a-service Ans: D Ref: TG2. Organizations need in-house technical support or a maintenance contract from a third party B. Open source software E.4 Software Issues Which of the following is not a disadvantage of opensource software? A. Size and location of the user base B. Number of the CDs required for the software C.4 Software Issues In order to protect their software from illegal distribution. May take time and money to train users D. reusable code B. third generation languages Ans: C Ref: TG2. B.5 Programming Languages Technology Guide 3 Multiple Choice Which of the following statements is not correct? A. Open systems D. software licensing D. visual programming languages D. Freeware B. You may use virtual credit cards for additional security. vendors often rely on _____ A. Bugs are discovered quickly D. Costs D. one of the primary advantages of an object is that it contains _____ A. private security agents C. Limited support is available only through online communities of core developers E.5 Programming Languages In an object-oriented language.A. Shareware C.4 Software Issues Programming languages that use icons. object-oriented languages B. and pull-down menus to develop applications are called _____ A. second generation languages C. Produces high quality code B. In-house technical skills E. You should use credit cards with your picture on them. Produces reliable code Ans: D Ref: TG2. May not be easy to use C. symbols. A. Produces code that can be changed to meet the needs of the users C. May not be compatible with existing systems E. 28 .
B.2 Behavioral Actions to Protect Your Information Assets Which of the following statements about companies that provide proactive protection of your information assets is not correct? A. Web sites. E. Anti-spyware Ans: C Response: TG3. your credit limit. E. zero D. and screenshots.3 Computer-Based Actions to Protect Your Information Assets _____ software logs keystrokes. E. D. where your liability with debit cards is _____? A.3 Computer-Based Actions to Protect Your Information Assets Methods you should use to protect your portable devices and information include all of the following except A. enable users to selectively filter content Ans: C Response: TG3. Web cams. Virtual credit cards cannot be used for in-store purchases. Anti-malware C. all of the above Ans: E Response: TG3.C. the amount in your bank account. C. You should use debit cards whenever possible for additional security. They should tell you when a program or connection is attempting to do something that you do not want. zero to $50. Monitoring D. windows.2 Behavioral Actions to Protect Your Information Assets Personal firewalls perform all of the following functions except: A. These companies allow their customers to lock their credit files. e-mails. B. Signing up with these companies means that merchants and banks must have verbal or written permission from their customers before opening new credit in their names. C. Ans: C Response: TG3.3 Computer-Based Actions to Protect Your Information Assets 29 . Ans: B Response: TG3. do not leave your portable devices in plain view in a car C. records all Web sites visited C. your credit limit B. These companies will proactively monitor their clients’ credit files at the three credit reporting agencies. A. Signatures on credit cards are often impossible to read. These companies operate independently of the three major credit reporting agencies. keep your portable devices in an inconspicuous container D. They should alert you to suspicious behavior. Internet connection. D. applications. Ans: C Response: TG3. They should block outbound connections that you do not initiate. Firewall B. blocks access to undesirable Web sites B. proactively monitor computers against malware attacks D.3 Computer-Based Actions to Protect Your Information Assets Content filtering software performs all of the following functions except A. zero E. your credit limit.2 Behavioral Actions to Protect Your Information Assets Your liability with credit cards is typically _____. Content filtering E. These companies ensure that new lines of credit cannot be opened unless their clients unlock their credit files. D. They should seek out the origin of malware in an attempt to block it in the future. records both sides of chat conversations E. passwords. chat conversations. the amount in your bank account C. the amount in your bank account. encrypt the hard drive of your laptop E. use two-factor authentication B. They should make your computer invisible. the amount in your bank account Ans: E Response: TG3.
Optical modem Ans: C Response: TG4. WPA.1 The Telecommunications System _____ signals convey information in wave form. you should use the _____ encryption standard.1 The Telecommunications System Data is sent through a fiber-optic cable by: A. where _____ signals convey information in digital. analog Ans: B Response: TG4. Laser D.3 Computer-Based Actions to Protect Your Information Assets _____ manage all routing communications with peripheral devices for a large computer system. Front-end processors D. Clients Ans: C Response: TG4. WPA2.1 The Telecommunications System _____ allow a single communications channel to carry data transmissions simultaneously from many sources. Fiber optic cable B. Multiplexers C. WEP E. A. Modems B. WEP. Fiber optic cable D.1 The Telecommunications System By using an Integrated Services Digital Network (ISDN) service. Electromagnetic switch C. Cellular radio Ans: D Response: TG4. packet D. Front-end processors D. WPA2. Twisted-pair wire B. digital C. WEP B. Satellite transmission C. Front-end processors D. Integrated circuits E. Clients Ans: B .Response: TG4. Analog. A. Multiplexer E. Multiplexers C. More voice 30 Technology Guide 4 The function of _____ is to convert digital signals to analog signals and vice-versa. Optical switch B. A. Coaxial cable C. A. binary form.1 The Telecommunications System Which of the following is not a communications channel? A. packet B. Clients Ans: A Response: TG4. Servers E. Packet. Digital. Modems B.1 The Telecommunications System For security in your wireless computing. Modems B. WPA C. analog E. Twisted-pair wire D. rather than the older _____ encryption standard. WPA D. an organization will be able to transmit _____ data than if it used Digital Subscriber Line (DSL) . WEP. Digital. Multiplexers C. Copper cable Ans: C Response: TG4.1 The Telecommunications System The cable medium with the highest bandwidth is: A. A. A. Cellular radio E. Servers E. Servers E. WPB Ans: D Response: TG3. Analog.
enterprise network E. Enable geographically dispersed employees to work together D. gateway E.2 Types of Networks A(n) _____ connects similar networks. Client computers C. router B.2 Types of Networks The components of a local area network include which of the following? A. Wireline or wireless communications media D. Network interface cards E.2 Types of Networks A(n) _____ sends messages through several connected LANs or to a wide area network. Enable organizations to be more flexible B. computer applications. wide area network C.2 Types of Networks A(n) _____ allows a device to physically connect to a local area network’s communications medium. A. More C. network interface card C.2 Types of Networks A(n) _____ connects dissimilar networks.1 The Telecommunications System Which of the following are advantages of computer networks? A. Protocol B. value added network Ans: A Response: TG4. All of the above Ans: E Response: TG4. Network interface cards E.2 Types of Networks A(n) _____ connects two or more devices in a limited geographical area. The same amount of E. All of the above Ans: E Response: TG4. File server B. 31 . All of the above Ans: C Response: TG4. file server Ans: A Response: TG4. and data C. bridge D. Bandwidth Ans: E Response: TG4. File server B. network interface card C. gateway E. Broadband C. personal area network D. Less D. Client computers C. A. bridge D. local area network B. A.B. Bridge D. More streaming video Ans: C Response: TG4. Capacity D. network interface card C. bridge D. file server Ans: C Response: TG4. A. gateway E. Ethernet B. Narrowband E.1 The Telecommunications System _____ refers to the range of frequencies available in any communications channel.2 Types of Networks Which of the following is not a component of a local area network? A. router B. Provide a critical link between businesses and their customers E. file server Ans: D Response: TG4. Enable companies to share hardware. A.
network interface card C. centralized E. provided by individual companies B. application software packages E. communications channel E. peer-to-peer D. Packets are routed through different paths C. client/server C. A. error checking Ans: A Response: TG4.2 Types of Networks Characteristics of wide area networks include all of the following except: A. packet switching D. torrents E. cover large geographical areas D. WANs D.3 Network Fundamentals Which of the following is not a characteristic of packet switching ? A. synonymous with network interface card Ans: B Response: TG4. sequencing the transfer of packets across the network E.3 Network Fundamentals In TCP/IP.3 Network Fundamentals BitTorrent uses a process called _____. mainframe-centric Ans: B Response: TG4.A. Packets contain a sequence number B. gateway Ans: B Response: TG4. file server B. client/server architectures C. open systems B. leeching B. swarming Ans: E Response: TG4. which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.2 Types of Networks In order to ensure that computers developed by different manufacturers can communicate. the Internet is an example of a wide area network Ans: A Response: TG4. moving packets over the network D.3 Network Fundamentals A protocol is A. Packets contain destination addressing Ans: C Response: TG4. protocols B. combine multiple communications channels E.3 Network Fundamentals A type of processing that links two or more computers in an arrangement in which some machines provide computing services for user computers is best described as A. network operating system D. developmental architectures Ans: A Response: TG4. _____ have been developed.3 Network Fundamentals 32 . establishing the Internet connection between two computers C. a device that handles the switching of voice and data in a local area network B. collaboration C. disassembling and reassembling of packets during transmission B. Packets use TCP/IP to carry their data E. a standard set of rules and procedures for control of communications in a network C. IP is responsible for A. A. Packets require dedicated circuits D. the main communications channel in a wide area network E. have large capacity C. a communications service for the connection of devices in a local area network D.
This action might not be possible to undo. Are you sure you want to continue?