INF1505 Exam Questions
INF1505 Exam Questions
2. Typically, are used in large enterprises because their cost and installation complexity.
4. technology uses special hardware and software to give users the feeling of being
part of an environment.
8. In the phase, analysts define the problem and generate alternates for solving it.
9. Using the model transfers the old retail model to the e-commerce world by using the
medium of the internet.
a). Mixed c). Brokerage
10. The decision maker defines associations between alternatives and criteria during the ,
phase of the decision-making process.
12. The cost of industrial robots can range from and more.
15. component of a VR system enable users to see and hear the virtual world.
c). Walker
19. Which term refers to the rate computed by dividing the number of clicks an ad gets by the total
impressions bought?
a). Cost per click rate (CPC) c). Click-through rate (CTR)
b). Cost per thousand (CPM) d). Cost per impression rate (CPI)
20. TVs that adjust screen color and texture for each frame and stabilize the volume based on the
viewer’s location in the room are demonstrating .
22. refers to giving objects in a VR environment texture and shading for a 3-D
appearance.
27. are usually formed for people to exchange opinions and ideas on a specific topic,
usually of a technical or schorlarly nature.
28. How data is stored on and retrieved from a hard disk is like view.
30. The most common way to index and link databases is using .
31. In the Matsushita in Japan built a virtual kitchen that enabled customers to
change fixtures and appliances and alter the design on a computer and virtually walk around the
kitchen space.
33. One advantage of grid computing is meaning that if one node on the grid fails, another
node can take over.
a). Parallel processing c). Scalability
34. Integrating into the SDLC process is a good idea to ensure system’s success.
36. Nanotechnology incorporates techniques that involve the structure and composition of materials
on a .
38. An attack by a hacker might not be an actual thread to an organisation’s security system.
39. The problem of missing deadlines is common in the information system field, but designers can
often minimize this problem by using tools.
40. Record keeping, payroll, and simple inventory problems are example of tasks.
42. A operation searches data in a table and retrieves records based on certain criteria.
45. cost measures what you would miss by not having a system or feature.
47. are generated by Web server software, record a user’s actions on a Web site.
49. A podcast has a specific and is defined with an XML item bag.
51. The means you can use copyrighted materials for certain purposes, such as
quoting passages of a book in literary reviews.
52. The component of a VR system is an input device that captures and records
movement of a user’s feet as the user walks or turns in different directions.
c). Walker
53. memory, which nonvolatile, holds data when the computer is off or during the
course of the program’s operation.
54. SOA advocates that core business functions and the dynamic functions that change all the time
should be .
55. A shows a process at a more general level and is helpful for showing top management
and the task force how a process works.
a). Rivalry among existing competitors c). The thread of substitute products
60. A decision maker examines the organization’s environment for conditions that need decisions
during phase of the decision-making process.
62. According to Symantec Corporation, in 2008 the number of computer viruses in existence
exceeded one .
64. A Trojan program contains code intended to disrupt a computer, network or Web site, and it is
usually hidden in a(n) program.
69. During the design phase, the design involves selecting a specific platform such a DELL
servers running Ubuntu Linex.
70. agents usually track and report on computer equipment and network systems to
predict when a system crash or failure might occur.
71. The main objective of is to prevent purchases from the suppliers that are not on
the approved list of sellers and to eliminate the processing of cost purchases.
76. You encrypt a message with your key and use an algorithm that hashes the message and creates
a .
78. A(n) database has the ability to represent more complex data relationships that
a relational database.
79. Microsoft Internet Explorer (IE). Mozilla Firefox, Google Chrome, Apple Safari, and Opera are
.
82. CASE tools are most useful during the phase of the SDLC.
85. The first expert system, called DENDRAL, was developed in the mid- at Stanford
University.
86. “ “ means all market participants can trade at the same price.
88. are goals and objectives that decision makers establish in order to achieve certain
performances.
91. is collecting date from Web site, usually for competitive intelligence.
93. A decision support system is particularly useful during the phase of the decision-
making process.
94. A(n) works with KBMS to endure that the knowledge base is as up-to-date as possible.
a). 12 c). 40
a). 12 c). 48
97. A is a hardware device that allows several nodes to share one communication channel.
101. An example of analysis involves entering a customer account number and having
the system display the customer’s current balance.
102. In a bus topology, are used at each end of the cable to absorb the signal.
103. The end results of the phase should give users and top management a clear view
of what the problem is and how the information system will solve the problem.
105. The best approach to control the proliferation of invalid and inconsistent data in corporate
databases is controlling the of data.
106. A catalog displays product description based on customer’s previous experiences and
preferences.
107. The costs of a GSS implementation are high because the system includes many .
109. The layer of the OSI model specifies the electrical connections between computers and
the transmission medium, and defines the physical medium used for communication.
114. A(n) system is used to coordinate operations, resources and decision making
between manufacturing, production, marketing and human resource.
119. have been added to sports gear, such as Tennis and Golf balls and Tennis Rackets,
to make them more durable and improve their responsiveness.
124. RFID tags can be embedded in a sticker or under the skin (human or animal).
125. Grouping objects along with their attributes and methods into a class is called .
126. A generates revenue from the fees charged for matching buyers and sellers.
b). 24 d). 64
128. main function is to provide information on security incidents, including information
systems’ vulnerabilities, viruses, and malicious programs.
130. In backward chaining, the expert system starts with the first.
131. A(n) is a peripheral device for recording, storing, and retrieving information.
132. is when end users develop their own information system with little or no formal
assistance from the information system team.
133. With the model, users don’t need to be concerned with new software versions and
compatibility problems because the ASP offer the most recent version of the software.
134. In the IA field engineers try to discover “Rule-of-Thumb” that enables computers
to perform tasks usually handled by humans.
135. To begin designing a relational database, you must define the structure by
defining each table and the fields in it.
138. The is responsible for specifying data requirements, what models are needed, and how
those models might be used.
139. enables business partners to send and receive information on business transactions.
141. , divides a project into smaller functions, and developers can’t go on to the next
phase until the current phase is finished.
142. The component of a ERP system collects and analyses relevant internal and external
data and information.
143. Digitized maps and oriented database are two major components of a GIS.
146. A helps break down a complex process into simpler, more manageable, more
understandable subprocesses.
147. Any system connected to the Internet running is subject to a denial of service attack.
149. In data communication, refers to integrating voice, video, and data so that
multimedia information can be used for decision making.
151. intelligence applications might be helpful in the future for handling qualitative decisions.
a). Reviewing and evaluating the prototype c). Developing the prototype
155. A(n) denotes the type of organisation or country the address specifies.
156. cables are glass tubes surrounded by concentric layers of glass, called “cladding”, to
form a light path through wire cables.
157. can be used to make sure people don’t vote more than once.
159. plan list the tasks that must be performed to restore damaged data and equipment.
167. The approach to setting up a distributed database addresses how tables are divided
among multiple locations.
170. With you request data from the database by constructing a statement made up
of query forms.
171. Distributing data among multiple sites minimizes the effect of computer .
172. Generally, managers perform six tasks for which an EIS is useful. One of these is .
173.A is a computer and all software for managing network resources and offering
services to a network.
174. RFID tags have been decreasing in price and are currently less than per tag.
177. Intelligent agents demonstrate the capability to select problems or solutions that
need attention and act on them.
178. Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing
habits; this is an example of .
179. aims at increasing Web site’s performance on search engines in a natural (and free) fashion.
181. Using the Internet and Web protocols for EDI lowers the cost of documents.
182. Transistors were the major technology for the generation of hardware.
183. Using software, you can perform “what if” analysis on data.
185. Organisations with an established IT infrastructure often choose a(n) CRM, which is
implemented much like any other IT system.
186. A travels from computer to computer, in a network, but it doesn’t usually erase data.
187. In encryption the same key is used to encrypt and decrypt the message.
188. was developed so that users could communicate with computers in their own
language.
189. One major obstacle to using VR technology is that not enough are currently available.
191. perform well at simple, repetitive tasks and can be used to free worker from tedious
or hazardous jobs.
193. Shopping and agents help users navigate through the vast resources available on
the Web.
194. The first generation computer language consists of a series of representing data
or instructions.
206. The layer of the OSI model generates the receiver’s address and ensures the integrity of
messages by making sure packets are delivered without error, in sequence, and with no loss or
duplication.
207. In conversion, the old and new systems run simultaneously for a short time to ensure
that the new system works correctly.
209. In an expert system, a(n) engine is similar to the model base component of a decision
support system.
210. The Internet2 (12) project started in 1987 and has been planned as a(n) network.
211. is a popular on-line payment system used in many on-line auction sites.
212. is registering, selling, or using a domain name to profit from someone else’s trademark.
213. robots have limited mobility, limited vision, and some speech capabilities.
215. With outsourcing, the organisation chooses an outsourcing company in the same
country.
217. computing is a platform incorporating many recent technologies under one platform.
225. Many organizations now follow the model to form teams that can handle network
intrusions and attacks quickly and effectively.
226. The component of an expert system is important because it helps give users confidence
in the system’s results.
227. systems have been one of the most successful AI-related technologies.
228. The amount of data that can be transferred from one point to another in one second is called
.
229. A database the heart of DBMS software is responsible for data storage, manipulation,
and retrieval.
230. In the model, each record can have multiple parents and multiple children.
232. The Internet has improved productivity in many organizations, but this improvement must be
converted to .
234. Accessing one central database server could increase for remote users.
235. The document is created during the requirements-gathering and analysis phase.
236. A , market concentrates on a specific function or business and automates this function
or process for different industries.
237. Online brokerage firms operate in a highly competitive environment, so they use information
technologies to make their services more unique in order to combat .
238. Using the , model brings sellers and buyers together on the Web and collects
commissions on transactions between these parties.
241. In a(n) file, each alphabetic, numeric, or special character is represented with a 7-
bit binary number.
242. A company can purchase a(n) package that might include service from different
vendors, but the e-distributor coordinated them into one package for customers.
245. Passive tags usually last longer than active tags; the best ones have about of battery
life.
248. The final results of the economic feasibility study is the report.
249. Sometimes an information system needs to be designed from scratch, and the
model is particularly suitable in these situations.
250. The operator searches for records that don’t meet the condition.