Technology Guide 1 - MIS315-05

advertisement
Chapter 1
Multiple Choice
Which of the following statements is not correct?
A. To succeed in today’s environment, it is often
necessary to change business models and strategies.
B. IT enables organizations to survive in the face of
business pressures.
C. IT requires small investments over a long period
of time.
D. Organizations can leverage their platforms to
develop Web-based applications, products, and
services.
ANS: C
REF: Material following chapter opening case
The modern business environment has all of the
following characteristics except:
A. global
B. interconnected
C. competitive
D. relatively static
E. real-time
ANS: D
REF: Material following chapter opening case
REF: 1.1 Information Systems: Concepts and
Definitions
If Amazon uses a list of all your purchases (books
bought, price paid, dates) to recommend other books
to you, then Amazon is applying its _____.
A. data
B. information
C. knowledge
D. experience
E. wisdom
ANS: C
REF: 1.1 Information Systems: Concepts and
Definitions
An organization’s information technology
architecture:
A. provides a guide for current operations
B. provides a blueprint for future directions
C. integrates the information requirements of the
organization and all users
D. is analogous to the architecture of a house
E. all of the above
ANS: E
REF: 1.1 Information Systems: Concepts and
Definitions
_____ deal with the planning for – and the
development, management, and use of – technology
to help people perform their tasks related to
information processing.
A. IT architecture
B. IT infrastructure
C. information technology
D. management information systems
E. IT services
_____ are the computer hardware, software, and
communications technologies that are used by IT
personnel to produce IT services.
A. IT components
B. IT services
C. information technology
D. information system
E. computer-based information system
ANS: D
REF: 1.1 Information Systems: Concepts and
Definitions
ANS: A
REF: 1.1 Information Systems: Concepts and
Definitions
_____ is (are) data that have been organized to have
meaning and value to a recipient.
A. data
B. information
C. knowledge
D. experience
E. wisdom
An organization’s _____ consists of the physical
facilities, IT components, IT services, and IT
management that will support the entire organization.
A. information technology architecture
B. information technology infrastructure
C. information technology
D. information system
E. computer-based information system
ANS: B
1
ANS: B
REF: 1.1 Information Systems: Concepts and
Definitions
_____ is the integration of economic, social, cultural,
and ecological facets of life, enabled by information
technologies.
A. regionalization
B. nationalization
C. globalization
D. business environment
ANS: C
REF: 1.2 The Global, Web-Based Platform
Globalization 1.0 focused on _____, Globalization
2.0 focused on _____, and Globalization 3.0 focuses
on _____.
A. companies, groups, countries
B. countries, groups, companies
C. countries, companies, groups
D. groups, companies, countries
E. groups, countries, companies
ANS: C
REF: 1.2 The Global, Web-Based Platform
_____ enables computer applications to interoperate
without human interaction.
A. supply-chaining
B. informing
C. uploading
D. work-flow software
E. outsourcing
ANS: D
REF: 1.2 The Global, Web-Based Platform
_____ means that you can create content and send or
post it to the Web.
A. informing
B. insourcing
C. delivering
D. participating
E. uploading
ANS: E
REF: 1.2 The Global, Web-Based Platform
If your university hires a company to manage its
entire human resources function, then your university
is practicing _____.
A. insourcing
B. outsourcing
C. offshoring
D. temporary hiring
E. consulting
ANS: B
REF: 1.2 The Global, Web-Based Platform
The workforce in developed countries has which of
the following characteristics?
A. more diversified
B. more women
C. more single parents
D. more persons with disabilities
E. all of the above
ANS: E
REF: 1.3 Business Pressures, Organizational
Responses, and IT Support
ANS: D
REF: 1.2 The Global, Web-Based Platform
_____ involves taking a specific function that your
company was doing itself, having another company
perform that same function for you, and then
integrating their work back into your operation.
A. informing
B. insourcing
C. offshoring
D. outsourcing
E. uploading
Today’s customers have which of the following
characteristics?
A. less knowledge about products
B. less sophistication
C. difficulty in finding information about products
D. higher expectations
E. difficulty in comparing prices
ANS: D
REF: 1.3 Business Pressures, Organizational
Responses, and IT Support
2
E. procedures
When identical items are produced in large
quantities, this is called:
A. strategic systems
B. customer focus
C. continuous improvement
D. mass production
E. mass customization
ANS: D
REF: 1.3 Business Pressures, Organizational
Responses, and IT Support
Which of the following is not a fact about IT careers?
A. The four-fastest growing U.S. jobs that require
college degrees from 2002 through 2012 are ITrelated.
B. Highly-skilled IT jobs will typically not be
offshored.
C. There are no computing jobs.
D. MIS majors usually receive high starting salaries.
ANS: C
REF: 1.4 Why Are Information Systems Important to
You?
Chapter 2
Multiple Choice
Which of the following statements about information
systems is not correct?
A. Information systems are concentrated in the IS
Department.
B. Information systems tend to follow the structure of
the organization.
C. Information systems are based on the needs of
employees.
D. Any information system can be strategic.
E. Managing information systems is difficult.
Ans: A
Ref: Discussion immediately following Chapter
opening case
A collection of related files, tables, and so on that
stores data and the associations among them is
_____.
A. hardware
B. software
C. database
D. network
Ans: C
Ref: 2.1 Types of Information Systems
Which of the following is not a major capability of
information systems?
A. perform high-speed, high-volume numerical
computations
B. provide fast, accurate communications among
organizations
C. store very small amounts of information in a very
large space
D. increase the effectiveness and efficiency of people
working in groups
E. automate semiautomatic business processes
Ans: C
Ref: 2.1 Types of Information Systems
Two information systems that support the entire
organization are:
A. Enterprise resource planning systems, dashboards
B. Transaction processing systems, office automation
systems
C. Enterprise resource planning systems, transaction
processing systems
D. Expert systems, office automation systems
E. Expert systems, transaction processing systems
Ans: C
Ref: 2.1 Types of Information Systems
When your purchases are swiped over the bar-code
reader at the point-of-sale terminals at Wal-Mart, a
_____ records the data.
A. transaction processing system
B. functional area information system
C. dashboard
D. enterprise resource planning system
E. office automation system
Ans: A
Ref: 2.1 Types of Information Systems
Supply chain systems are which type of information
system?
A. departmental information systems
B. enterprisewide information systems
C. interorganizational information systems
3
D. end-user computing systems
E. individual information systems
Ans: C
Ref: Types of Information System
_____ attempt to duplicate the work of human
experts by applying reasoning capabilities.
A. expert systems
B. dashboards
C. functional area information systems
D. decision support systems
E. business intelligence systems
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The threat of competitors’ entering a market is very
high in industries that perform a(n) _____ role, and in
industries where the primary product or service is
_____.
A. intermediation, physical
B. broker, physical
C. sales, financial
D. financial, digital
E. intermediation, digital
Ans: A
Ref: 2.1 Types of Information Systems
Ans: E
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
_____ provide rapid access to timely information and
direct access to structured information in the form of
reports.
A. expert systems
B. dashboards
C. functional area information systems
D. decision support systems
E. business intelligence systems
Buyer power is _____ when buyers have many
choices from whom to buy and _____ when buyers
have few choices.
A. high, the same
B. high, low
C. low, low
D. low, high
E. low, the same
Ans: B
Ref: 2.1 Types of Information Systems
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Information-based industries are most susceptible to
which one of Porter’s five forces?
A. threat of entry of new competitors
B. bargaining power of suppliers
C. bargaining power of customers
D. threat of substitute products
E. rivalry among existing firms in an industry
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
For most companies, the Web _____ the threat that
new competitors will enter the market by _____
traditional barriers to entry.
A. decreases, increasing
B. increases, decreasing
C. increases, increasing
D. decreases, decreasing
Ans: B
Porter’s competitive forces model helps organizations
identify _____, where his value chain model helps
organizations identify specific _____.
A. competitive opportunities, activities
B. general strategies, activities
C. activities, competitive opportunities
D. activities, general strategies
E. primary activities, support activities
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
_____ activities create value for which customers are
willing to pay, where _____ activities do not add
value directly to the firm’s products or services.
A. Support, primary
B. Human resource management, inbound logistics
C. Procurement, operations
D. Primary, support
4
E. Accounting, outbound logistics
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Offering different products, services, or product
features is which strategy for competitive advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: B
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Introducing new products and putting new features in
existing products is which strategy for competitive
advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer-orientation
Ans: C
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Improving the manner in which internal business
processes are executed is which strategy for
competitive advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer orientation
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
When Amazon welcomes you by name back to its
Web site on your second visit, this is an example of
which strategy for competitive advantage?
A. cost leadership
B. differentiation
C. innovation
D. operational effectiveness
E. customer orientation
Ans: E
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
The impact of IT on managers’ jobs is all of the
following except:
A. gives managers time to get into the field
B. managers can spend more time planning
C. managers must spend more time managing fewer
employees
D. managers can gather information more quickly
E. none of the above
Ans: C
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Porter’s _____ help(s) companies identify general
strategies, where his _____ help(s) to identify
specific activities where companies can use the
strategies for greatest impact.
A. Value chain model, competitive forces model
B. Primary activities, support activities
C. Competitive forces model, primary activities
D. Competitive forces model, value chain model
E. Value chain model, support activities
Ans: D
Ref: 2.2 Competitive Advantage and Strategic
Information Systems
Which of the following statements concerning
information resources is not correct?
A. Information resources include all the hardware,
information systems and applications, data, and
networks in an organization.
B. Without their information resources, organizations
cannot function.
C. Information resources typically do not change
quickly.
D. Information resources are expensive to acquire,
operate, and maintain.
Ans: C
Ref: 2.4 Managing Information Resources
5
_____ is the direct use of information systems by
employees in their work.
A. Transaction processing systems
B. Executive information systems
C. Decision support systems
D. Management information systems
E. End-user computing
Ans: E
Ref: 2.4 Managing Information Resources
Dividing the responsibility for developing and
maintaining information resources between the
Information System Department and end users
depends on all of the following except :
A. Size of the organization
B. Amount and type of information resources in the
organization
C. Organization’s revenue and profits
D. Organization’s attitude towards computing
E. Maturity level of the organization’s information
technologies
Ans: B
Response: Chapter opening case
Various organizations that promote fair and
responsible use of information systems often develop
_____:
A. a code of ethics
B. a strategic plan
C. a mission statement
D. responsibility charters
E. a goals outline
Ans: A
Response: 3.1 Ethical Issues
What is _____ is not necessarily _____.
A. Illegal, unethical
B. Ethical, illegal
C. Unethical, illegal
D. Unethical, legal
E. Ethical, legal
Ans: C
Ref: 2.4 Managing Information Resources
Ans: C
Response: 3.1 Ethical Issues
The role of the director of the Information Systems
Department is changing from more _____ to more
_____.
A. hands-on, managing
B. technical, managerial
C. operational, technical
D. hands-on, decision-making
E. managerial, technical
_____ issues involve collecting, storing and
disseminating information about individuals.
A. privacy
B. accuracy
C. transferability
D. property
E. accessibility
Ans: B
Ref: 2.4 Managing Information Resources
Chapter 3
Which of the following was not one of TJX’s
problems?
A. The company’s security was originally breached.
B. The company disclosed the security breach to its
customers too quickly.
C. The attackers had the company’s encryption key.
D. The company did not know about the breach
immediately when it occurred.
E. The company did not know which data were stolen
and when.
Ans: A
Response: 3.1 Ethical Issues
_____ issues involve the authenticity and fidelity of
information that is collected and processed.
A. privacy
B. accuracy
C. transferability
D. property
E. accessibility
Ans: B
Response: 3.1 Ethical Issues
_____ issues involve who may obtain information
and how much they should pay for this information.
6
A. privacy
B. accuracy
C. transferability
D. property
E. accessibility
Ans: E
Response: 3.1 Ethical Issues
Which of the following statements is correct?
A. An individual’s right to privacy is absolute.
B. It is difficult to determine and enforce privacy
regulations.
C. An individual’s right to privacy supersedes the
needs of society.
D. Advances in information technologies have not
affected individual privacy.
E. The Internet has increased individuals’ privacy.
Ans: B
Response: 3.1 Ethical Issues
Which of the following statements is not correct?
A. Employees have limited protection against
surveillance by employers.
B. The large majority of organizations monitor
employee Internet usage.
C. The large majority of organizations use URL
filtering.
D. As with normal first-class mail, employers cannot
read employee e-mail.
E. Employees should be aware that surveillance is
legal.
Ans: D
Response: 3.1 Ethical Issues
Which of the following statements is correct?
A. International privacy and security laws are very
consistent.
B. Consistent international privacy and security laws
help companies with their regulatory requirements
from country to country.
C. Consistent international privacy and security laws
enable information to flow freely among countries.
D. International privacy and security laws have led to
a complex global legal framework.
E. Consistent international privacy and security laws
are followed by all countries.
Ans: D
Response: 3.1 Ethical Issues
When Lexis-Nexis suffered a security breach, the
most important lesson that the company learned was
which of the following?
A. Encrypt your data.
B. Use biometric identification.
C. It is enough to protect your own internal network.
D. You must take responsibility for the security of
your business partners and customers.
E. You must have insurance to cover the costs of a
security breach.
Ans: D
Response: 3.1 Ethical Issues
Which of the following factors are not increasing the
threats to information security?
A. smaller computing devices
B. downstream liability
C. the Internet
D. limited storage capacity on portable devices
E. due diligence
Ans: D
Response: 3.2 Threats to Information Security
The computing skills necessary to be a hacker are
decreasing for which of the following reasons?
A. More information systems and computer science
departements are teaching courses on hacking so that
their graduates can recognize attacks on information
assets.
B. Computer attack programs, called scripts, are
available for download from the Internet.
C. International organized crime is training hackers.
D. Cybercrime is much more lucrative than regular
white-collar crime.
E. Almost anyone can buy or access a computer
today.
Ans : B
Response : Threats to Information Security
Your company’s computers have been taken over by
an attacker and used to attack another organization’s
information systems. Your problem is which of the
following?
A. poor security policies and procedures
B. lack of due diligence
7
C. downstream liability
D. poor service-level agreements
E. users have a lack of information security
awareness
Ans: C
Response: 3.2 Threats to Information Security
Rank the following in terms of dollar value of the
crime, from highest to lowest.
A. robbery – white collar crime – cybercrime
B. white collar crime – extortion – robbery
C. cybercrime – white collar crime – robbery
D. cybercrime – robbery – white collar crime
E. white collar crime – burglary – robbery
Ans: C
Response: 3.2 Threats to Information Security
A(n) _____ is any danger to which an information
resource may be exposed.
A. vulnerability
B. risk
C. control
D. threat
E. compromise
Ans: D
Response: 3.2 Threats to Information Security
E. finance, management information systems
Ans: B
Response: 3.2 Threats to Information Security
_____ involves building an inappropriate trust
relationship with employees for the purpose of
gaining sensitive information or unauthorized access
privileges.
A. reverse social engineering
B. hacking
C. spoofing
D. social engineering
E. spamming
Ans: D
Response: 3.2 Threats to Information Security
Dumpster diving is:
A. always illegal because it is considered trespassing
B. never illegal because it is not considered
trespassing
C. typically committed for the purpose of identity
theft
D. always illegal because individuals own the
material in the dumpster
E. always legal because the dumpster is not owned by
private citizens
Ans: C
Response: 3.2 Threats to Information Security
A(n) information system’s _____ is the possibility
that the system will suffer harm by a threat.
A. vulnerability
B. risk
C. control
D. danger
E. compromise
Ans: A
Response: 3.2 Threats to Information Security
A(n) _____ is intellectual work that is known only to
a company and is not based on public information.
A. copyright
B. patent
C. trade secret
D. knowledge base
E. private property
Ans: C
Response: 3.2 Threats to Information Security
Employees in which functional areas of the
organization pose particularly grave threats to
information security?
A. human resources, finance
B. human resources, management information
systems
C. finance, marketing
D. operations management, management information
systems
A(n) _____ is a document that grants the holder
exclusive rights on an invention for 20 years.
A. copyright
B. patent
C. trade secret
D. knowledge base
E. private property notice
8
Ans: B
Response: 3.2 Threats to Information Security
_____ are segments of computer code that attach to
existing computer programs and perform malicious
acts.
A. viruses
B. worms
C. Trojan horses
D. back doors
E. alien software
Ans: A
Response: 3.2 Threats to Information Security
_____ are software programs that hide in other
computer programs and reveal their designed
behavior only when they are activated.
A. viruses
B. worms
C. Trojan horses
D. back doors
E. alien software
Ans: C
Response: 3.2 Threats to Information Security
_____ are segments of computer code embedded
within an organization’s existing computer programs,
that activate and perform a destructive action at a
certain time or date.
A. viruses
B. worms
C. Trojan horses
D. back doors
E. logic bomb
Ans: E
Response: 3.2 Threats to Information Security
_____ uses deception to fraudulently acquire
sensitive personal information by masquerading as an
official e-mail.
A. zero-day attack
B. denial-of-service
C. distributed denial-of-service
D. phishing
E. brute force dictionary attack
Ans: D
Response: 3.2 Threats to Information Security
In a(n) _____ attack, a coordinated stream of requests
is launched against a target system from many
compromised computers at the same time.
A. phishing
B. denial-of-service
C. worm
D. back door
E. distributed denial-of-service
Ans: E
Response: 3.2 Threats to Information Security
_____ is designed to use your computer as a launch
pad for sending unsolicited e-mail to other
computers.
A. spyware
B. spamware
C. adware
D. virus
E. worm
Ans: B
Response: 3.2 Threats to Information Security
_____ is the process in which an organization
assesses the value of each asset being protected,
estimates the probability that each asset might be
compromised, and compares the probable costs of
each being compromised with the costs of protecting
it.
A. risk management
B. risk analysis
C. risk mitigation
D. risk acceptance
E. risk transference
Ans: B
Response: 3.3 Protecting Information Resources
In _____, the organization takes concrete actions
against risks.
A. risk management
B. risk analysis
C. risk mitigation
D. risk acceptance
E. risk transference
9
Ans: C
Response: 3.3 Protecting Information Resources
In _____, the organization purchases insurance as a
means to compensate for any loss.
A. risk management
B. risk analysis
C. risk mitigation
D. risk acceptance
E. risk transference
Ans: E
Response: 3.3 Protecting Information Resources
Which of the following statements is not correct
concerning the difficulties in protecting information
resources?
A. Computing resources are typically decentralized.
B. Computer crimes often remain undetected for a
long period of time.
C. Rapid technological changes ensure that controls
are effective for years.
D. Employees typically do not follow security
procedures when the procedures are inconvenient.
E. Computer networks can be located outside the
organization.
Ans: C
Response: 3.3 Protecting Information Resources
Ans: E
Response: 3.3 Protecting Information Resources
Chapter 4
Multiple Choice
It is very difficult to manage data for which of the
following reasons?
A. amount of data stays about the same over time
B. data are scattered throughout organizations
C. decreasing amount of external data needs to be
considered
D. data security is easy to maintain
E. data are stored in the same format throughout
organizations
Ans: B
Ref: 4.1 Managing Data
Place the following members of the data hierarchy in
the correct order:
A. bit – byte – field – record – database – file/table
B. bit – field – byte – record – file/table – database
C. byte – bit – record – field – database
D. bit – byte – field – record – file/table – database
E. bit – record – field – byte – file/table -- database
Ans: D
Ref: 4.2 The Database Approach
_____ controls restrict unauthorized individuals
from using information resources and are concerned
with user identification.
A. access controls
B. physical controls
C. data security controls
D. administrative controls
E. input controls
Ans: A
Response: 3.3 Protecting Information Resources
Which of the following is not a characteristic of
strong passwords?
A. should be difficult to guess
B. should contain special characters
C. should not be a recognizable word
D. should not be a recognizable string of numbers
E. should be shorter rather than longer so the
password can be remembered
Verifying that no alphabetic characters are in a Social
Security Number field is an example of _____ :
A. data isolation
B. data integrity
C. data consistency
D. data redundancy
E. application/data dependence
Ans: B
Ref: 4.2 The Database Approach
_____ occurs when the same data are stored in many
places.
A. Data isolation
B. Data integrity
C. Data consistency
D. Data redundancy
E. Application/data dependence
10
Ans: D
Ref: 4.2 The Database Approach
_____ occurs when various copies of the data agree.
A. Data isolation
B. Data integrity
C. Data consistency
D. Data redundancy
E. Application/data dependence
Ans: C
Ref: 4.2 The Database Approach
A(n) _____ represents a character, such as a letter,
number, or symbol.
A. byte
B. field
C. record
D. file
E. database
Ans: A
Ref: 4.2 The Database Approach
In a database, the primary key field is used to _____:
A. specify an entity
B. create linked lists
C. identify duplicated data
D. uniquely identify a record
E. uniquely identify an attribute
Ans: D
Ref: 4.2 The Database Approach
As an individual student in your university’s student
database, you are a(n) _____ of the STUDENT class.
A. instance
B. individual
C. representative
D. entity
E. relationship
Ans: A
Ref: 4.2 The Database Approach
At Umass, students can take more than one class, and
each class can have more than one student. This is an
example of what kind of relationship?
A. one-to-one
B. one-to-many
C. many-to-one
D. many-to-many
E. some-to-many
Ans: D
Ref: 4.2 The Database Approach
In the relational database model, related tables can be
joined when they contain common _____.
A. Files
B. Rows
C. Records
D. Columns/Fields
Ans: D
Ref: 4.3 Database Management Systems
Data dictionaries perform all of the following
functions except:
A. Provide information on each record
B. Provide information on why fields/attributes are
needed in the database
C. Define the format necessary to enter data into the
database
D. Provide information on name of fields/attributes
E. Provide information on how often fields/attributes
should be updated
Ans: A
Ref: 4.3 Database Management Systems
In a relational database, every row represents a
_____:
A. file
B. record
C. attribute
D. primary key
E. secondary key
Ans: B
Ref: 4.3 Database Management Systems
A standardized language used to manipulate data is
_____:
A. MS-Access
B. Oracle
C. query-by-example language
D. structured query language (SQL)
E. data manipulation language (DML)
11
Ans: D
Ref: 4.3 Database Management Systems
Data dictionaries provide which of the following
advantages to the organization?
A. reduce data inconsistency
B. provide for faster program development
C. make it easier to modify data and information
D. all of the above
Ans: D
Ref: 4.3 Database Management Systems
_____ is a method for analyzing and reducing a
relational database to its most streamlined form.
A. Structured query
B. Normalization
C. Query by example
D. Joining
E. Relational analysis
Ans: B
Ref: 4.3 Database Management Systems
When data are normalized, fields/attributes in the
table depend only on the _____.
A. Common record
B. Common attribute
C. Primary key
D. Common row
Ans: C
Ref: 4.3 Database Management Systems
The data in a data warehouse:
A. Are updated constantly in real time
B. Are updated in batch mode, approximately once
per day
C. Are not updated
D. Are purged constantly as new data enter
E. Are available for MIS analysts, but not users
Ans: C
Ref: 4.4 Data Warehousing
The process of moving data from various sources into
the data warehouse is called:
A. Upload
B. Extract, transform, load
C. Online transaction processing
D. Master data management
E. Online analytical processing
Ans: B
Ref: Data Warehousing
_____ is a formal approach to managing data
consistently across an entire organization.
A. Database management
B. Enterprise information management
C. Data warehousing
D. Data governance
E. Data mart
Ans : D
Ref : Data Governance
Difficulty : Easy
_____ provides companies with a single version of
the truth for their data.
A. Data warehouse
B. Data mart
C. Database
D. Master data management
E. Enterprise information management
Ans: D
Ref: 4.5 Data Governance
_____ is a process that helps organizations identify,
select, organize, disseminate, transfer, and apply
expertise that are part of the organization’s memory
and typically reside inside the organization in an
unstructured manner.
A. discovery
B. knowledge management
C. decision support
D. online analytical processing
E. data mining
Ans: B
Ref: 4.6 Knowledge Management
Historically, management information systems have
focused on capturing, storing, managing, and
reporting _____ knowledge.
A. tacit
B. explicit
C. managerial
12
D. geographical
E. cultural
Ans: B
Ref: 4.6 Knowledge Management
The most important benefit of knowledge
management systems is:
A. Improved customer service
B. Make best practices available to employees
C. Retention of scarce knowledge if employees retire
D. Improved morale
E. More efficient product development
Ans: B
Ref: Knowlege Management
Chapter 5
Multiple Choice
Fundamental points about network computing in
organizations include all of the following except:
A. Computers constantly exchange data
B. Computer data exchange provides significant
advantages to organizations
C. Networks can be of any size, from small to
enormous
D. Networks have had limited impact on
organizational productivity
E. Networks support new ways of doing business
Ans: D
Response: Material immediately following chapter
opening case
Networks enable which of the following
applications?
A. Discovery
B. Communications
C. Collaboration
D. Web services
E. All of the above
Ans: E
Response: Material immediately following chapter
opening case
Which of the following are advantages of computer
networks?
A. enable organizations to be more flexible
B. enable companies to share hardware, computer
applications, and data
C. enable geographically dispersed employees to
work together
D. provide a critical link between businesses and
their customers
E. all of the above
Ans: E
Response: Material immediately following chapter
opening case
The network application, _____, enables users to
access information located in databases all over the
world.
A. discovery
B. communications
C. collaboration
D.Web services
E. none of the above
Ans: A
Response: 5.1 Network Applications
Search engines and metasearch engines are examples
of which network application?
A. Discovery
B. Communications
C. Collaboration
D. Web services
E. None of the above
Ans: A
Response: 5.1 Network Applications
The amount of information on the Web _____
approximately each year.
A. stays about the same
B. decreases
C. doubles
D. quadruples
E. triples
Ans: C
Response: 5.1 Network Applications
_____ portals offer content for diverse communities
and are intended for broad audiences.
A. Industrywide
B. Personal
13
C. Affinity
D. Corporate
E. Commercial
Ans: E
Response: 5.1 Network Applications
_____ portals support communities such as hobby
groups or a political party.
A. Industrywide
B. Personal
C. Affinity
D. Corporate
E. Commercial
Ans: C
Response: 5.1 Network Applications
_____ portals coordinate content within relatively
narrow organizational and partners’ communities.
A. publishing
B. personal
C. affinity
D. corporate
E. commercial
Ans: D
Response: 5.1 Network Applications
Many organizations have implemented corporate
portals for which of the following reasons?
A. to cut costs
B. free up time for busy managers
C. improve profitability
D. offer customers self-service opportunities
E. all of the above
Ans: E
Response: 5.1 Network Applications
Portals are an example of which network application?
A. Discovery
B. Collaboration
C. Communications
D. Web services
E. None of the above
Ans: A
Response: 5.1 Network Applications
With _____, every call opened up a dedicated circuit
for the duration of the call.
A. voice over IP
B. plain old telephone service
C. chat room
D. teleconference
E. Internet relay chat
Ans: B
Response: 5.1 Network Applications
With _____, phone calls are treated as just another
kind of data.
A. Voice over IP
B. Plain old telephone service
C. Chat room
D. Teleconference
E. Internet relay chat
Ans: A
Response: 5.1 Network Applications
Workflow, groupware, and telepresence systems are
examples of which network application?
A. Discovery
B. Communications
C. Collaboration
D. Web services
E. None of the above
Ans: C
Response: 5.1 Network Applications
Key developments of the first generation of the Web
were:
A. Creation of Web sites
B. Heavy user interactivity with Web sites
C. Commercialization of the Web
D. A and B
E. A and C
Ans: E
Response: 5.2 Web 2.0
Users typically have little interaction with _____,
which provide information that users receive
passively.
A. Affinity portals
B. Web 1.0 sites
14
C. Web 2.0 sites
D. Wikis
E. Web 3.0 sites
Ans: B
Response: 5.2 Web 2.0
_____ is a Web development technique that allows
portions of Web pages to reload with fresh data rather
than requiring the entire page to reload.
A. AJAX
B. Tagging
C. Really simple syndication
D. Wikis
E. Blogging
Ans: A
Response: 5.2 Web 2.0
A process that allows users to place information in
multiple, overlapping associations is called _____.
A. AJAX
B. Tagging
C. Really simple syndication
D. Wikis
E. Blogging
Ans: B
Response: 5.2 Web 2.0
Difficulty: Easy
A process that enables users to create a personal Web
site containing his or her thoughts, feelings, and
opinions is called _____.
A. AJAX
B. Tagging
C. Really simple syndication
D. Wikis
E. Blogging
Ans: E
Response: 5.2 Web 2.0
A Web site on which anyone can post material and
make changes to other material is a(n) _____.
A. Blog
B. Wiki
C. Affinity portal
D. Really simple syndication feed
E. Podcast
Ans: B
Response: 5.2 Web 2.0
Only the author may make changes to a(n) _____,
where anyone can make changes to any content on
a(n) _____.
A. Blog, really simple syndication feed
B. Blog, Wiki
C. Podcast, Wiki
D. Podcast, really simple syndication feed
E. Wiki, blog
Ans: B
Response: 5.2 Web 2.0
_____ allows users to receive customized
information when they want it, without having to surf
thousands of Web sites.
A. AJAX
B. Tagging
C. Blogging
D. Podcasting
E. Really simple syndication
Ans: E
Response: 5.2 Web 2.0
A(n) _____ is a digital audio file that is distributed
over the Web for playback on portable media players
or personal computers.
A. Really simple syndication feed
B. Blog
C. Podcast
D. Videocast
E. Wiki
Ans: C
Response: 5.2 Web 2.0
_____ Web sites allow users to upload their content
to the Web, in the form of text, voice, images, and
videos.
A. Aggregators
B. Mashups
C. Social networking
D. Affinity portals
E. Really simple syndication
Ans: C
15
Response: 5.2 Web 2.0
A particularly valuable business-oriented social
networking site is:
A. MySpace
B. FaceBook
C. Flickr
D. LinkedIn
E. Twitter
Ans: D
Response: 5.2 Web 2.0
_____ are Web sites that provide collections of
content from all over the Web.
A. Aggregators
B. Social networks
C. Mashups
D. Corporate portals
E. Really simple syndication
Ans: A
Response: 5.2 Web 2.0
A(n) _____ is a Web site that takes content from
other Web sites and puts it together to create a new
type of content.
A. Aggregators
B. Social networks
C. Mashups
D. Corporate portals
E. Really simple syndication
Ans: C
Response: 5.2 Web 2.0
ChicagoCrime is a Web site that combines the
Chicago Police Department’s crime-report
information with Google Maps to provide a guide to
crime in Chicago. ChicagoCrime is an example of
which kind of Web 2.0 site?
A. Aggregators
B. Social networks
C. Mashups
D. Corporate portals
E. Really simple syndication
_____ are applications, delivered over the Internet,
that use shared protocols to interoperate without
human intervention.
A. Portals
B. Web services
C. Service-oriented architectures
D. Wikis
E. Webcrawlers
Ans: B
Response: 5.2 Web 2.0
_____ is a protocol that makes it easier to exchange
data among a variety of applications and to validate
and interpret such data.
A. Extensible markup language (XML)
B. Simple object access protocol
C. Web services description language (WSDL)
D. Universal description, discovery, and integration
(UDDI)
E. Hypertext markup language (HTML)
Ans: A
Response: 5.2 Web 2.0
_____ is a set of rules that define how messages can
be exchanged among different network systems and
applications.
A. Extensible markup language
B. Simple object access protocol
C. Web services description language
D. Universal description, discovery, and integration
E. Hypertext markup language
Ans: B
Response: 5.2 Web 2.0
_____ is used to create the document that describes
the tasks performed by various Web services.
A. Extensible markup language
B. Simple object access protocol
C. Web services description language
D. Universal description, discovery, and integration
E. Hypertext markup language
Ans: C
Response: 5.2 Web 2.0
Ans: C
Response: 5.2 Web 2.0
16
The benefits of e-learning include which of the
following?
A. increased content retention
B. current, high-quality content
C. consistency
D. flexibility
E. all of the above
Ans: E
Response: 5.3 E-Learning and Distance Learning
Which of the following is not a disadvantage of
telecommuting for employees?
A. decreased feelings of isolation
B. possible loss of fringe benefits
C. lower pay (in some cases)
D. no workplace visibility
E. slower promotions
Ans: A
Response: 5.4 Telecommuting
Chapter 6
Multiple Choice
Response: Material immediately following chapter
opening case
In this type of e-commerce, the sellers and buyers are
organizations.
A. government-to-citizen
B. consumer-to-consumer
C. business-to-business
D. business-to-consumer
E. consumer-to-business
Ans: C
Response: 6.1 Overview of E-Business and ECommerce
In this type of e-commerce, an organization provides
information and services to its workers.
A. business-to-employee
B. consumer-to-consumer
C. consumer-to-business
D. business-to-consumer
E. government-to-business
Ans: A
Response: 6.1 Overview of E-Business and ECommerce
The nature of business competition is changing
drastically as a result of all of the following except:
A. new online companies
B. new business models
C. the diversity of EC-related products and services
D. the increase in the number of digitizable products
E. companies are having difficulty integrating their
physical and electronic channels
Direct payment of Social Security benefits is an
example of which type of e-commerce?
A. government-to-citizen
B. consumer-to-consumer
C. consumer-to-business
D. business-to-consumer
E. business-to-business
Ans: E
Response: Material immediately following chapter
opening case
Ans: A
Response: 6.1 Overview of E-Business and ECommerce
Electronic commerce provides opportunities to do all
of the following except:
A. For companies to expand their reach
B. For companies to expand at relatively high cost
C. For companies to put rich information on their
Web sites
D. For companies to increase market share
E. For companies to adopt new business models
If you are an employee managing your fringe benefits
over your company’s intranet, you are engaging in
which of the following?
A. business-to-business
B. business-to-consumer
C. consumer-to-consumer
D. business-to-employee
E. government-to-citizen
Ans: B
Ans: D
17
Response: 6.1 Overview of E-Business and ECommerce
Which of the following statements regarding the
relationship between electronic commerce and search
is not correct?
A. Purchases often follow successful online searches
B. Shopping carts are often abandoned after
unsuccessful online searches
C. Retailers will provide fewer product details to
avoid information overload for customers
D. Customers will be able to find the closest store
offering the product that they want
E. Customers will have more relevant product
information in the near future
Ans: C
Response: 6.1 Overview of E-Business and ECommerce
In _____ auctions, there is one buyer who wants to
buy a product. Suppliers submit bids and the lowest
bid wins.
A. forward
B. static
C. reverse
D. physical
E. simple
Ans: C
Response: 6.1 Overview of E-Business and ECommerce
Ans: C
Response: 6.1 Overview of E-Business and ECommerce
In which of the following business models do
businesses request quotes from suppliers and use
B2B with a reverse auction mechanism?
A. find-the-best-price
B. electronic tendering system
C. name-your-own-price
D. online direct marketing
E. affiliate marketing
Ans: B
Response: 6.1 Overview of E-Business and ECommerce
Vendors ask partners to place logos or banners on
partners’ site. If customers click on logo, go to
vendor’s site and buy, then vendor pays commissions
to partners. This is which business model?
A. find-the-best-price
B. electronic tendering system
C. name-your-own-price
D. online direct marketing
E. affiliate marketing
Ans: E
Response: 6.1 Overview of E-Business and ECommerce
15. eBay uses a _____ auction.
A. forward
B. static
C. reverse
D. physical
E. simple
Which type of electronic commerce is the largest by
volume?
A. business-to-employee
B. consumer-to-consumer
C. business-to-business
D. business-to-consumer
E. none of the above
Ans: A
Response: 6.1 Overview of E-Business and ECommerce
Ans: C
Response: 6.3 Business-to-Business (B2B) Electronic
Commerce
16. _____ auctions employ a request for quotation.
A. forward
B. static
C. reverse
D. physical
E. simple
Which type of electronic commerce does Amazon
practice?
A. business-to-employee
B. consumer-to-consumer
C. consumer- to-business
D. business-to-consumer
18
E. employee-to-business
Ans: D
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
This type of e-commerce is known as e-tailing.
A. business-to-business
B. collaborative commerce
C. intrabusiness
D. business-to-consumer
E. consumer-to-business
Ans: D
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
The advantages of B2C for consumers include all of
the following except:
A. You can buy from home 24 hours per day, 7 days
per week.
B. You have a wider variety of products to choose
from.
C. You typically cannot access additional
information, so you do not have information
overload.
D. You can easily compare prices and features.
E. You can find unique items.
Ans: C
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
Which of the following is not an advantage of etailing?
A. you can buy from home, 24 hours per day
B. you have just a few products to choose from
C. you can obtain detailed information on products
D. you can compare competitor’s products and prices
E. all of the above
Ans: B
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
When middlemen are eliminated in a fully automated
electronic commerce transaction, this is called _____.
A. disintegration
B. supply chain integration
C. direct sales
D. disintermediation
E. value-added services
Ans: D
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
When Ford Motor Company decided to avoid direct
online sales, the company was trying to eliminate
which of the following?
A. federal sales taxes
B. customer irritation
C. channel conflict
D. channel integration
E. state sales taxes
Ans: C
Response: 6.2 Business-to-Consumer (B2C)
Electronic Commerce
In _____, direct and indirect materials in one industry
are purchased on an as-needed basis.
A. horizontal exchanges
B. vertical exchanges
C. buy-side marketplaces
D. functional exchanges
E. sell-side marketplaces
Ans: B
Response: 6.3 Business-to-Business (B2B) Electronic
Commerce
_____ connect buyers and sellers across many
industries and are used mainly for indirect materials.
A. Horizontal exchanges
B. Vertical exchanges
C. Buy-side marketplaces
D. Functional exchanges
E. Sell-side marketplaces
Ans: A
Response: 6.3 Business-to-Business (B2B) Electronic
Commerce
Which of the following is not a limitation of
traditional payment methods in electronic commerce?
A. cash cannot be used because there is no face-toface contact
B. takes time for payment in the mail
C. not all organizations accept credit cards
19
D. it is more secure for the buyer to use the telephone
than to complete a secure transaction on a computer
E. none of the above
Ans: D
Response: 6.4 Electronic Payments
_____ are a payment mechanism similar to regular
bank checks but transmitted electronically, with a
signature in digital form.
A. Electronic checks
B. Electronic credit cards
C. Electronic cash
D. Electronic wallet
E. Electronic debit cards
Ans: A
Response: 6.4 Electronic Payments
_____ use credit card numbers, transmitted
electronically over the Internet, to pay for goods and
services and are encrypted
A. Electronic checks
B. Electronic credit cards
C. Electronic cash
D. Electronic wallet
E. Electronic debit cards
Ans: B
Response: 6.4 Electronic Payments
_____ are typically used for unplanned B2B
purchases for amounts under $2000.
A. Electronic checks
B. Stored-value money cards
C. Purchasing cards
D. Smart cards
E. Person-to-person payments
Ans: B
Response: 6.4 Electronic Payments
_____ contain a chip that can store information and
can be used for several purposes.
A. Electronic checks
B. Stored-value money cards
C. Purchasing cards
D. Smart cards
E. Person-to-person payments
Ans: D
Response: 6.4 Electronic Payments
The practice of using similar but not identical domain
names is called _____.
A. Domain spoofing
B. Domain masquerading
C. Domain tasting
D. Cybersquatting
E. Domain fraud
Ans: C
Response: 6.5 Ethical and Legal Issues in E-Business
_____ refers to the practice of registering or using
domain names for the purpose of profiting from the
goodwill or trademark belonging to someone else.
A. Domain spoofing
B. Domain masquerading
C. Domain tasting
D. Cybersquatting
E. Domain fraud
Ans: D
Response: 6.5 Ethical and Legal Issues in E-Business
Ans: C
Response: 6.4 Electronic Payments
Chapter 7
Multiple Choice
A form of e-cash, _____ allows you to store a fixed
amount of prepaid money and then spend it as
necessary.
A. electronic checks
B. stored-value money cards
C. purchasing cards
D. smart cards
E. person-to-person payments
Individuals are finding it convenient and productive
to use wireless devices for which of the following
reasons?
A. To make use of time that was formerly wasted
B. To become more efficient
C. Work locations are more flexible
D. To be able to allocate working time around
personal and professional obligations
E. All of the above
20
Ans: E
Response: 7.1 Wireless Technologies
Which type of satellite has the largest footprint?
A. low earth orbit
B. medium earth orbit
C. geostationary
D. polar orbit
E. equatorial orbit
Ans: C
Response: 7.1 Wireless Technologies
The area of the earth reached by a satellite’s
transmission is called _____.
A. Hotspot
B. Coverage
C. Footprint
D. Zone
E. Wireless area
The main problem with radio transmission is which
of the following?
A. Radio waves cannot travel through walls
B. When you travel too far from the source, the
signal fades
C. Devices are difficult to install
D. Radio waves are slow
E. Devices are expensive to install
Ans: B
Response: 7.1 Wireless Technologies
_____ is a wireless standard that enables temporary,
short-range connection between mobile devices.
A. Bluetooth
B. wireless application protocol
C. short message service
D. wi-fi
E. global positioning system
Ans: A
Response: 7.2 Wireless Computer Networks and
Internet Access
Ans: C
Response: 7.1 Wireless Technologies
The greatest problem with GEO satellites is which of
the following?
A. Propagation delay
B. Expense
C. Orbital life
D. Size of footprint
E. Relative speed with respect to a point on the
earth’s surface
Ans: A
Response: 7.1 Wireless Technologies
_____ is a satellite-based tracking system that
enables the determination of a person’s position.
A. Bluetooth
B. wireless application protocol
C. short message service
D. wi-fi
E. global positioning system
Ans: E
Response: 7.1 Wireless Technologies
_____, with the shortest range of any wireless
network, is designed to be used with contactless
credit cards.
A. Near field communications
B. Bluetooth
C. Ultra-wideband
D. Wi-Fi
E. Infrared
Ans: A
Response: 7.2 Wireless Computer Networks and
Internet Access
Microwave transmission systems are used for _____
volume, _____ distance, _____ communications.
A. Low, long, broadcast
B. Low, short, line-of-sight
C. High, long, broadcast
D. High, short, broadcast
E. High, long, line-of-sight
Ans: E
Response: 7.2 Wireless Computer Networks and
Internet Access
21
Which of the following statements about Wi-Fi is not
correct?
A. Wi-Fi provides simple Internet access.
B. Laptop PCs can contain chips that send and
receive Wi-Fi signals.
C. Many companies offer free Wi-Fi access in their
stores.
D. Wi-Fi requires encryption for secure
transmissions.
E. Wi-Fi is expensive to set up.
Ans: E
Response: 7.2 Wireless Computer Networks and
Internet Access
A small geographical perimeter within which a
wireless access point provides service to a number of
users is called:
A. transceiver
B. hotspot
C. local reception
D. wireless network
E. GPS location
Ans: B
Response: 7.2 Wireless Computer Networks and
Internet Access
Today, most wireless local area networks use the
_____ standard, which can transmit up to 54 Mbps
and has a range of about 300 feet.
A. 555.11a/b
B. 702.11g/n
C. 872.11c
D. 802.11g/n
E. Wi-Max
Ans: D
Response: 7.2 Wireless Computer Networks and
Internet Access
_____ communicate via radio waves using radio
antennas placed within adjacent geographic areas.
A. Bluetooth
B. Cell phones
C. Satellite
D. Ultra-wideband
E. Near field communications
Response: 7.2 Wireless Computer Networks and
Internet Access
Mobile computing has two major characteristics that
differentiate it from other forms of computing. What
are these two characteristics?
A. Mobility, broad reach
B. Mobility, lack of expense
C. Security, broad reach
D. Security, mobility
E. Broad reach, localization
Ans: A
Response: 7.3 Mobile Computing and Mobile
Commerce
With regard to mobile computing, _____ means that
knowing where a user is physically is a key to
offering relevant products and services.
A. ubiquity
B. convenience
C. instant connectivity
D. personalization
E. localization of products and services
Ans: E
Response: 7.3 Mobile Computing and Mobile
Commerce
The development of mobile commerce is driven by
all of the following factors except:
A. widespread availability of mobile devices
B. the cell phone culture
C. increasing prices
D. bandwidth improvement
E. no need for a PC
Ans: C
Response: 7.3 Mobile Computing and Mobile
Commerce
Which of the following is not a mobile application in
financial services?
A. transaction processing systems
B. mobile banking
C. wireless electronic payment systems
D. micropayments
E. wireless wallets
Ans: B
Ans: A
22
Response: 7.3 Mobile Computing and Mobile
Commerce
Parking meters that you can pay via your mobile
telephone is an example of:
A. mobile banking
B. wireless electronic payment
C. wireless wallet
D. brokerage service
E. money transfer
Ans: B
Response: 7.3 Mobile Computing and Mobile
Commerce
Putting ads on top of taxicabs in New York City that
change as the cabs travel around the city is an
example of:
A. viral marketing
B. permission advertising
C. geographical advertising
D. location-based advertising
E. direct marketing
Ans: D
Response: 7.3 Mobile Computing and Mobile
Commerce
The generic term for technologies that use radio
waves to automatically identify individual items is:
A. telemetry
B. bar codes
C. shipping labels
D. radio-frequency identification (RFID)
E. wireless access point (WAP)
Ans: D
Response: 7.4 Pervasive Computing
Which of the following is not a problem with bar
codes?
A. They do not provide enough data.
B. They require line-of-sight.
C. They can be ripped or soiled.
D. They are expensive.
E. They identify the manufacturer and product, but
not the actual item.
Ans: D
Response: 7.4 Pervasive Computing
_____ collect data from many points over an
extended space.
A. Bluetooth networks
B. Ultra-wideband networks
C. Wireless sensor networks
D. Wi-Max networks
E. Wi-Fi networks
Ans: C
Response: 7.4 Pervasive Computing
The act of locating wireless local area networks while
moving around a city is called:
A. war dialing
B. war driving
C. war hacking
D. war cracking
E. war chalking
Ans: B
Response: 7.5 Wireless Security
A(n) _____ allows unauthorized entry into a wireless
network.
A. Lack of encryption
B. Disgruntled employee
C. Open node
D. Illegal server
E. Rogue access point
Ans: E
Response: 7.5 Wireless Security
_____ refers to efforts by unauthorized users to
access data traveling over wireless networks.
A. RF jamming
B. War driving
C. Eavesdropping
D. War chalking
E. Installing rogue access points
Ans: C
Response: 7.5 Wireless Security
In _____, a person or a device intentionally or
unintentionally interferes with your wireless network
transmissions.
A. RF jamming
23
B. War driving
C. Eavesdropping
D. War chalking
E. Installing rogue access points
Ans: A
Response: 7.5 Wireless Security
Technology Guide 1
Multiple Choice
Which of the following is not a component of
hardware?
A. Primary and secondary storage
B. The operating system
C. Input and output technologies
D. Central processing unit
E. Communication technologies
Ans: B
Ref: TG1.2 The Central Processing Unit
Which of the following is not a component of the
central processing unit?
A. Registers
B. Control unit
C. Secondary storage
D. Arithmetic-logic unit
Ans: C
Ref: TG1.2 The Central Processing Unit
The _____ is measured in megahertz or gigahertz.
A. clock speed
B. word length
C. bus width
D. line width
E. bandwidth
Ans: A
Ref: TG1.2 The Central Processing Unit
Gordon Moore (with Moore’s Law) predicted that
microprocessor complexity would do which of the
following?
A. Double every year
B. Double every two years
C. Increase slowly
D. Decrease slowly
E. Decrease rapidly
Ans: B
Ref: TG1.2 The Central Processing Unit
Increased microprocessor complexity comes from
which of the following?
A. Decreasing line width
B. Increasing transistor miniaturization
C. Using new materials for the chip that increase
conductivity
D. Putting more transistors on the chip
E. All of the above
Ans: E
Ref: TG1.2 The Central Processing Unit
The amount and type of memory that a computer
possesses affects which of the following?
A. The type of program the computer can run
B. The speed of the computer
C. The cost of the computer
D. The cost of processing data
E. All of the above
Ans: E
Ref: TG1.3 Computer Memory
Arrange in the correct sequence, from smallest to
largest:
A. megabyte – kilobyte – gigabyte – terabyte
B. kilobyte – megabyte – terabyte – gigabyte
C. kilobyte – megabyte – gigabyte – terabyte
D. megabyte – terabyte – kilobyte – gigabyte
E. kilobyte – gigabyte – megabyte – terabyte
Ans: C
Ref: TG1.3 Computer Memory
Which of the following is not stored in primary
storage?
A. Data to be processed by the CPU
B. Instructions for the CPU as to how to process the
data
C. Archival data
D. Operating system programs
E. None of the above
Ans: C
Ref: TG1.3 Computer Memory
24
Which of the following is not a type of primary
storage?
A. Register
B. Random access memory
C. Flash memory
D. Read-only memory
E. Cache memory
Ans: C
Ref: TG1.3 Computer Memory
The part of primary storage that holds a software
program (or portion of it) and small amounts of data
when they are brought from secondary storage is
called
A. read-only memory
B. random access memory
C. cache memory
D. registers
E. flash memory
Ans: B
Ref: TG1.3 Computer Memory
Random access memory is _____ and _____.
A. volatile, temporary
B. nonvolatile, permanent
C. nonvolatile, temporary
D. volatile, permanent
E. None of the above
Ans: A
Ref: TG1.3 Computer Memory
Which of the following is not a type of primary
storage?
A. Random access memory
B. Registers
C. Cache
D. Read-only memory
E. Optical Storage
Ans: E
Ref: TG1.3 Computer Memory
The type of primary storage, closest to the CPU
where the computer can temporarily store blocks of
data used most often is called
A. read-only memory
B. registers
C. random access memory
D. cache memory
E. flash memory
Ans: D
Ref: TG1.3 Computer Memory
The type of primary storage where certain critical
instructions are safeguarded because the storage is
nonvolatile and the instructions can be read only by
the computer and not changed by the user is called
A. read-only memory
B. random access memory
C. cache memory
D. registers
E. flash memory
Ans: A
Ref: TG1.3 Computer Memory
Secondary storage has which of the following
characteristics?
A. Nonvolatile
B. More cost effective than primary storage
C. Slower than primary storage
D. Can utilize a variety of media
E. All of the above
Ans: E
Ref: TG1.3 Computer Memory
_____, a type of enterprise storage system, links
groups of hard drives to a specialized
microcontroller, which coordinates the drives so they
appear to be a single, logical drive.
A. Redundant array of independent disks (RAID)
B. Storage area network (SAN)
C. Network-attached storage (NAS)
D. Secondary storage
E. Primary storage
Ans: A
Ref: TG1.3 Computer Memory
_____, a type of enterprise storage system, is an
architecture for building dedicated networks that
allow rapid and reliable access to storage devices by
multiple servers.
A. Redundant array of independent disks (RAID)
25
B. Storage area network (SAN)
C. Network-attached storage (NAS)
D. Secondary storage
E. Primary storage
Ans: B
Ref: TG1.3 Computer Memory
To model the weather or simulate nuclear weapons
testing, you would most likely use a
A. mainframe computer
B. workstation
C. supercomputer
D. personal computer
E. active badge
E. None of the above
Ans: D
Ref: TG1.4 Computer Hierarchy
In _____, a service provider makes computing
resources and infrastructure management available to
a customer as needed.
A. server farm
B. virtualization
C. grid computing
D. utility/subscription computing
E. the Internet
Ans: D
Ref: TG1.6 Innovations in Hardware Utilization
Ans: C
Ref: TG1.4 Computer Hierarchy
A _____ is used in large enterprises for extensive
computing applications that are accessed by
thousands of concurrent users.
A. supercomputer
B. mainframe
C. midrange computer
D. microcomputer
E. laptop computer
Ans: B
Ref: TG1.4 Computer Hierarchy
_____ refers to the creation of materials, devices, and
systems on a scale of billionths of a meter.
A. Nanotechnology
B. Ultra-large scale integration
C. Very-large scale integration
D. Utility computing
E. Edge computing
Ans: A
Ref: TG1.6 Innovations in Hardware Utilization
Technology Guide 2
Multiple Choice
Many firms are recentralizing their applications to
mainframes for which of the following reasons?
A. To support the large number of transactions
caused by electronic commerce
B. To reduce the total cost of ownership of
distributed systems
C. To simplify administration of IT resources
D. To improve system performance
E. all of the above
Today, software comprises a larger percentage of the
cost of modern computer systems than it did in the
early 1950s for which of the following reasons?
A. Hardware costs have decreased
B. Hardware performance has increased
C. Software has become increasingly complex
D. Building software applications remains slow,
complex, and error-prone
E. All of the above
Ans: E
Ref: TG1.4 Computer Hierarchy
Ans: E
Ref: TG2.1 Significance of Software
A _____ is the least expensive general-purpose
computer.
A. supercomputer
B. mainframe
C. midrange computer
D. microcomputer/personal computer
The set of computer programs used to manage
hardware resources is called
A. Microsoft Office Suite
B. application software
C. general software
D. systems software
E. personal application software
26
Ref: TG2.2 Systems Software
Ans: D
Ref: TG2.1 Significance of Software
The set of computer instructions that provides
specific functionality to a user is called
A. transaction processing software
B. application software
C. general software
D. systems software
E. microcode
Ans: B
Ref: TG2.1 Significance of Software
Which of the following is not a function of the
operating system?
A. Allocates CPU time and main memory to
programs running on the computer
B. Provides an interface between the user and the
hardware
C. Supervises the overall operation of the computer
D. Increases the complexity of the system to the user
E. None of the above
Ans: D
Ref: TG2.2 Systems Software
_____ means that several parts of the same
application can work simultaneously.
A. Multithreading
B. Multitasking
C. Time-sharing
D. Scalability
E. Multiprocessing
Ans: A
Ref: TG2.2 Systems Software
_____ occurs when a computer system with two or
more processors runs more than one program, or
thread, at a given time by assigning them to different
processors.
A. Multithreading
B. Multitasking
C. Time-sharing
D. Scalability
E. Multiprocessing
Ans: E
_____ are programs that sort records, create
directories and sub-directories, restore accidently
deleted files, and manage memory usage.
A. System utilities
B. General application software
C. Personal application software
D. System performance monitors
E. System security monitors
Ans: A
Ref: TG2.2 Systems Software
_____ are programs that protect a computer system
from unauthorized use, fraud, and destruction.
A. System utilities
B. General application software
C. Personal application software
D. System performance monitors
E. System security monitors
Ans: E
Ref: TG2.2 Systems Software
Creating specific application software using an
organization’s own resources is called what?
A. Outsourcing
B. Consultant-based development
C. In-house development
D. Contract software
E. Application service providers
Ans: C
Ref: TG2.3 Application Software
Off-the-shelf software _____.
A. may not match an organization’s current work
processes and data
B. is more flexible in making modifications
C. requires more risk because all features and
performance are not known
D. is rarely tested prior to release
Ans: A
Ref: TG2.3 Application Software
Which of the following is not a factor in the selection
of software?
27
A. Size and location of the user base
B. Number of the CDs required for the software
C. Costs
D. In-house technical skills
E. System capabilities
Ans: B
Ref: TG2.4 Software Issues
In order to protect their software from illegal
distribution, vendors often rely on _____
A. encryption
B. private security agents
C. software licensing
D. Internet-based distribution methods
Ans: C
Ref: TG2.4 Software Issues
_____ is software whose source code is available at
no cost to developers and users.
A. Freeware
B. Shareware
C. Open systems
D. Open source software
E. Software-as-a-service
E. Runs slower than comparable vendor-developed
software
Ans: E
Ref: TG2.4 Software Issues
_____ is software that typically allows no access to
the underlying source code.
A. Freeware
B. Shareware
C. Open systems
D. Open source software
Ans: B
Ref: TG2.4 Software Issues
Programming languages that use icons, symbols, and
pull-down menus to develop applications are called
_____
A. object-oriented languages
B. second generation languages
C. visual programming languages
D. Java
E. third generation languages
Ans: C
Ref: TG2.5 Programming Languages
Ans: D
Ref: TG2.4 Software Issues
Which of the following is not an advantage of opensource software?
A. Produces high quality code
B. Produces code that can be changed to meet the
needs of the users
C. Bugs are discovered quickly
D. Limited support is available only through online
communities of core developers
E. Produces reliable code
Ans: D
Ref: TG2.4 Software Issues
In an object-oriented language, one of the primary
advantages of an object is that it contains _____
A. reusable code
B. reusable data
C. embedded graphics
D. messages
E. no errors
Ans: A
Ref: TG2.5 Programming Languages
Technology Guide 3
Multiple Choice
Which of the following is not a disadvantage of opensource software?
A. Organizations need in-house technical support or a
maintenance contract from a third party
B. May not be easy to use
C. May take time and money to train users
D. May not be compatible with existing systems
Which of the following statements is not correct?
A. You should use credit cards with your picture on
them.
B. You may use virtual credit cards for additional
security.
28
C. You should use debit cards whenever possible for
additional security.
D. Virtual credit cards cannot be used for in-store
purchases.
E. Signatures on credit cards are often impossible to
read.
Ans: C
Response: TG3.2 Behavioral Actions to Protect Your
Information Assets
Your liability with credit cards is typically _____,
where your liability with debit cards is _____?
A. the amount in your bank account, your credit limit
B. your credit limit, the amount in your bank account
C. the amount in your bank account, zero
D. your credit limit, zero
E. zero to $50, the amount in your bank account
Ans: E
Response: TG3.2 Behavioral Actions to Protect Your
Information Assets
Which of the following statements about companies
that provide proactive protection of your information
assets is not correct?
A. These companies allow their customers to lock
their credit files.
B. These companies ensure that new lines of credit
cannot be opened unless their clients unlock their
credit files.
C. These companies operate independently of the
three major credit reporting agencies.
D. Signing up with these companies means that
merchants and banks must have verbal or written
permission from their customers before opening new
credit in their names.
E. These companies will proactively monitor their
clients’ credit files at the three credit reporting
agencies.
Ans: C
Response: TG3.2 Behavioral Actions to Protect Your
Information Assets
Personal firewalls perform all of the following
functions except:
A. They should make your computer invisible.
B. They should seek out the origin of malware in an
attempt to block it in the future.
C. They should alert you to suspicious behavior.
D. They should block outbound connections that you
do not initiate.
E. They should tell you when a program or
connection is attempting to do something that you do
not want.
Ans: B
Response: TG3.3 Computer-Based Actions to Protect
Your Information Assets
_____ software logs keystrokes, e-mails,
applications, windows, Web sites, Internet
connection, passwords, chat conversations, Web
cams, and screenshots.
A. Firewall
B. Anti-malware
C. Monitoring
D. Content filtering
E. Anti-spyware
Ans: C
Response: TG3.3 Computer-Based Actions to Protect
Your Information Assets
Content filtering software performs all of the
following functions except
A. blocks access to undesirable Web sites
B. records all Web sites visited
C. proactively monitor computers against malware
attacks
D. records both sides of chat conversations
E. enable users to selectively filter content
Ans: C
Response: TG3.3 Computer-Based Actions to Protect
Your Information Assets
Methods you should use to protect your portable
devices and information include all of the following
except
A. use two-factor authentication
B. do not leave your portable devices in plain view in
a car
C. keep your portable devices in an inconspicuous
container
D. encrypt the hard drive of your laptop
E. all of the above
Ans: E
Response: TG3.3 Computer-Based Actions to Protect
Your Information Assets
29
Response: TG4.1 The Telecommunications System
For security in your wireless computing, you should
use the _____ encryption standard, rather than the
older _____ encryption standard.
A. WPA, WEP
B. WPA2, WPA
C. WEP, WPA
D. WPA2, WEP
E. WEP, WPB
Ans: D
Response: TG3.3 Computer-Based Actions to Protect
Your Information Assets
Technology Guide 4
The function of _____ is to convert digital signals to
analog signals and vice-versa.
A. Modems
B. Multiplexers
C. Front-end processors
D. Servers
E. Clients
Ans: A
Response: TG4.1 The Telecommunications System
_____ signals convey information in wave form,
where _____ signals convey information in digital,
binary form.
A. Analog, packet
B. Analog, digital
C. Digital, packet
D. Digital, analog
E. Packet, analog
Ans: B
Response: TG4.1 The Telecommunications System
_____ allow a single communications channel to
carry data transmissions simultaneously from many
sources.
A. Modems
B. Multiplexers
C. Front-end processors
D. Servers
E. Clients
_____ manage all routing communications with
peripheral devices for a large computer system.
A. Modems
B. Multiplexers
C. Front-end processors
D. Servers
E. Clients
Ans: C
Response: TG4.1 The Telecommunications System
Which of the following is not a communications
channel?
A. Fiber optic cable
B. Satellite transmission
C. Twisted-pair wire
D. Integrated circuits
E. Cellular radio
Ans: D
Response: TG4.1 The Telecommunications System
The cable medium with the highest bandwidth is:
A. Twisted-pair wire
B. Coaxial cable
C. Fiber optic cable
D. Cellular radio
E. Copper cable
Ans: C
Response: TG4.1 The Telecommunications System
Data is sent through a fiber-optic cable by:
A. Optical switch
B. Electromagnetic switch
C. Laser
D. Multiplexer
E. Optical modem
Ans: C
Response: TG4.1 The Telecommunications System
By using an Integrated Services Digital Network
(ISDN) service, an organization will be able to
transmit _____ data than if it used Digital Subscriber
Line (DSL) .
A. More voice
Ans: B
30
B. More
C. Less
D. The same amount of
E. More streaming video
Ans: C
Response: TG4.1 The Telecommunications System
_____ refers to the range of frequencies available in
any communications channel.
A. Protocol
B. Broadband
C. Capacity
D. Narrowband
E. Bandwidth
Ans: E
Response: TG4.1 The Telecommunications System
Which of the following are advantages of computer
networks?
A. Enable organizations to be more flexible
B. Enable companies to share hardware, computer
applications, and data
C. Enable geographically dispersed employees to
work together
D. Provide a critical link between businesses and
their customers
E. All of the above
Ans: E
Response: TG4.2 Types of Networks
The components of a local area network include
which of the following?
A. File server
B. Client computers
C. Wireline or wireless communications media
D. Network interface cards
E. All of the above
Ans: E
Response: TG4.2 Types of Networks
Which of the following is not a component of a local
area network?
A. File server
B. Client computers
C. Bridge
D. Network interface cards
E. All of the above
Ans: C
Response: TG4.2 Types of Networks
A(n) _____ connects dissimilar networks.
A. Ethernet
B. network interface card
C. bridge
D. gateway
E. file server
Ans: D
Response: TG4.2 Types of Networks
A(n) _____ connects two or more devices in a limited
geographical area.
A. local area network
B. wide area network
C. personal area network
D. enterprise network
E. value added network
Ans: A
Response: TG4.2 Types of Networks
A(n) _____ connects similar networks.
A. router
B. network interface card
C. bridge
D. gateway
E. file server
Ans: C
Response: TG4.2 Types of Networks
A(n) _____ sends messages through several
connected LANs or to a wide area network.
A. router
B. network interface card
C. bridge
D. gateway
E. file server
Ans: A
Response: TG4.2 Types of Networks
A(n) _____ allows a device to physically connect to a
local area network’s communications medium.
31
A. file server
B. network interface card
C. network operating system
D. communications channel
E. gateway
Ans: B
Response: TG4.2 Types of Networks
Characteristics of wide area networks include all of
the following except:
A. provided by individual companies
B. have large capacity
C. cover large geographical areas
D. combine multiple communications channels
E. the Internet is an example of a wide area network
Ans: A
Response: TG4.2 Types of Networks
In order to ensure that computers developed by
different manufacturers can communicate, _____
have been developed.
A. protocols
B. client/server architectures
C. WANs
D. application software packages
E. developmental architectures
Ans: A
Response: TG4.3 Network Fundamentals
B. establishing the Internet connection between two
computers
C. moving packets over the network
D. sequencing the transfer of packets across the
network
E. error checking
Ans: A
Response: TG4.3 Network Fundamentals
Which of the following is not a characteristic of
packet switching ?
A. Packets contain a sequence number
B. Packets are routed through different paths
C. Packets require dedicated circuits
D. Packets use TCP/IP to carry their data
E. Packets contain destination addressing
Ans: C
Response: TG4.3 Network Fundamentals
A type of processing that links two or more
computers in an arrangement in which some
machines provide computing services for user
computers is best described as
A. open systems
B. client/server
C. peer-to-peer
D. centralized
E. mainframe-centric
Ans: B
Response: TG4.3 Network Fundamentals
A protocol is
A. a device that handles the switching of voice and
data in a local area network
B. a standard set of rules and procedures for control
of communications in a network
C. a communications service for the connection of
devices in a local area network
D. the main communications channel in a wide area
network
E. synonymous with network interface card
BitTorrent uses a process called _____, which
eliminates file-sharing bottlenecks by having
everyone share little pieces of a file at the same time.
A. leeching
B. collaboration
C. packet switching
D. torrents
E. swarming
Ans: B
Response: TG4.3 Network Fundamentals
Ans: E
Response: TG4.3 Network Fundamentals
In TCP/IP, IP is responsible for
A. disassembling and reassembling of packets during
transmission
32
Download