0% found this document useful (0 votes)
47 views

INF1505 Exam Questions

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

INF1505 Exam Questions

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

INF1505 Exam Questions.

1. media operate on line-of-sight.

a). Coaxial c). Terrestrial microwave

b). Multipoint d). Fibre optic

2. Typically, are used in large enterprises because their cost and installation complexity.

a). SANs c). CD ROMs

b). NASs d). Hard disks

3. refers to the accuracy of information resources within an organisation.

a). Availability c). Confidentiality

b). Integrity d). Security

4. technology uses special hardware and software to give users the feeling of being
part of an environment.

a). Immersion c). Interaction

b). Simulation d). Telepresence

5. data is information in its original form.

a). Summary c). Raw

b). Open d). Transformed

6. A typical PDA includes a(n) .

a). External monitor c). External keyboard

b). Mouse d). Calendar

7. A is an inexperienced, usually young hacker.

a). Black hat c). White hat

b). Wizard d). Script kiddie

8. In the phase, analysts define the problem and generate alternates for solving it.

a). Requirements gathering and analysis c). Design

b). Implementation d). Planning

9. Using the model transfers the old retail model to the e-commerce world by using the
medium of the internet.
a). Mixed c). Brokerage

b). Advertising d). Merchant

10. The decision maker defines associations between alternatives and criteria during the ,
phase of the decision-making process.

a). Intelligence c). Design

b). Implementation d). Choice

11. The component of a DSS coordinates the other components.

a). User interface c). DSS engine

b). Model base d). Database

12. The cost of industrial robots can range from and more.

a). $10,000 to $30,000 c). $100,000 to $250,000

b). $50,000 to $100,000 d). $500,000 to $1,000,000

13. The term RAID stands for .

a). Redundant access for independent devices

b). Random access for independent disks

c). Redundant array of independent disks

d). Random array of independent drives

14. The topology is costly and difficult to maintain.

a). Bus c). Star

b). Ring d). Mesh

15. component of a VR system enable users to see and hear the virtual world.

a). Manual navigation control

b). visual and aural

c). Walker

d). Central coordinating processor and software system

16. Intelligent agents are also called .

a). Moles c) Bots

b). Rootkits d). Rats


17. is a social networking Web site.

a). Sony Music Group c). Facebook

b). XML d). Droid

18. In the URL, http://www.csub,edu/-hbidgoli/books.html, represents the name of


directory in which files are stored.

a). Books.html c). www.csub.edu

b). http d). –hbidgoli

19. Which term refers to the rate computed by dividing the number of clicks an ad gets by the total
impressions bought?

a). Cost per click rate (CPC) c). Click-through rate (CTR)

b). Cost per thousand (CPM) d). Cost per impression rate (CPI)

20. TVs that adjust screen color and texture for each frame and stabilize the volume based on the
viewer’s location in the room are demonstrating .

a). Personal agent qualities c). Fuzzy logic

b). Surveillance d). Artificial neural capabilities

21. uses computer-generated, three-dimensional images to create the illusion of


interaction in a real-world environment.

a). Wi-Fi c). Nanotechnology

b). VR technology d). WiMAX

22. refers to giving objects in a VR environment texture and shading for a 3-D
appearance.

a). Telepresence c). Simulation

b). Interaction d). Immersion

23. is Web-based personal financial management service that is an example of SaaS.

a). Mint.com c). Basecamp

b). Salesforce.com d). Google Talk

24. A is a size of a character.

a). Nibble c). Word

b). Byte d). Bit


25. Extensive training is one solution to the problem of feasibility.

a). Economic c). Technical

b). Schedule d). Operational

26. Cloud computing includes components in the form of as a service (IaaS).

a). Internet c). Infrastructure

b). Investment d). Information

27. are usually formed for people to exchange opinions and ideas on a specific topic,
usually of a technical or schorlarly nature.

a). Discussion groups c). IRC

b). News groups d). E-mail groups

28. How data is stored on and retrieved from a hard disk is like view.

a). Physical c). Logical

b). Hard copy d). Storage

29. E-commerce fulfils the product information activity using .

a). Phone calls c). Web sites

b). E-mail d). Faxes

30. The most common way to index and link databases is using .

a). Names c). Addresses

b). Social Security numbers d). Drivers licence numbers

31. In the Matsushita in Japan built a virtual kitchen that enabled customers to
change fixtures and appliances and alter the design on a computer and virtually walk around the
kitchen space.

a). 1970s c). 1990s

b). 1980s d). 2000s

32. analysis is available in spreadsheet programs such as Microsoft Excel.

a). What-is c). What-if

b). Lookup d). Cause-and-effect

33. One advantage of grid computing is meaning that if one node on the grid fails, another
node can take over.
a). Parallel processing c). Scalability

b). Improved reliability d). Sharing

34. Integrating into the SDLC process is a good idea to ensure system’s success.

a). Feasibility checkpoints c). Operating costs

b). RAD d). Intangible benefits

35. A(n) RSS feeds makes use of to distribute Web content.

a). HTML c). Twitter

b). XML d). Podcasting

36. Nanotechnology incorporates techniques that involve the structure and composition of materials
on a .

a). Nanoframe c). Nanobyte

b). Nanometer d). Nanoscale

37. Level 1 security involves .

a). Front-end servers c). Corporate networks

b). Physical security d). Back-end systems

38. An attack by a hacker might not be an actual thread to an organisation’s security system.

a). Black hat c). White hat

b). Wizard d). Script Kiddie

39. The problem of missing deadlines is common in the information system field, but designers can
often minimize this problem by using tools.

a). Dataflow c). Project management

b). CASE d). Flowcharts

40. Record keeping, payroll, and simple inventory problems are example of tasks.

a). Unstructured c). Structured

b). Automated d). Semistructured

41. What is the first step in client/server communication?

a). The server receives the query

b). The results are formatted and displayed


c). The user creates a query

d). The client accepts the request

42. A operation searches data in a table and retrieves records based on certain criteria.

a). Find c). Project

b). Join d). Select

43. The main technology used in an exocentric environment is .

a). 3-D Graphics c). VRD

b). HMD d). Nanotechnology

44. The is at the centre of the CPFR process.

a). Retailer c). Supplier

b). Manufacturer d). Consumer

45. cost measures what you would miss by not having a system or feature.

a). Investment c). Economic

b). Opportunity d). Operational

46. Scheduling and assigning employees might be handled by a(n) .

a). PIS c). MFIS

b). LIS d). LIS

47. are generated by Web server software, record a user’s actions on a Web site.

a). Spam c). Viruses

b). Log files d). Logins

48. computer conferencing includes an audio link but has no video.

a). Desktop c). Real-time

b). Analog d). Video

49. A podcast has a specific and is defined with an XML item bag.

a). DNS c). Address

b). Transaction ID d). URL


50. IBM system z10 is an example of generation computer.

a). Second c). Fourth

b). Third d). Fifth

51. The means you can use copyrighted materials for certain purposes, such as
quoting passages of a book in literary reviews.

a). Copyright Act of 1994 c). Fair Use Doctrine

b). ACM Code of Ethics d). Digital Millennium Act

52. The component of a VR system is an input device that captures and records
movement of a user’s feet as the user walks or turns in different directions.

a). Manual navigation control

b). Visual and aural

c). Walker

d). Central coordinating processor and software system

53. memory, which nonvolatile, holds data when the computer is off or during the
course of the program’s operation.

a). Open c). Raw

b). Secondary d). Replicated

54. SOA advocates that core business functions and the dynamic functions that change all the time
should be .

a). Eliminated c). Magnified

b). Combined d). Decoupled

55. A shows a process at a more general level and is helpful for showing top management
and the task force how a process works.

a). Conceptual use model c). Data flow diagram

b). Context diagram d). Flowchart

56. is the opposite of buyer power.

a). Rivalry among existing competitors c). The thread of substitute products

b). Supplier power d). The threat of new entrants


57. Data mining agents work with a .

a). Knowledge base c). Data warehouse

b). Catalog d). Filter

58. Search engines use software called “crawlers”, “spiders” or .

a). Web browsers c). Directories

b). HTML d). Bots

59. Preparing a budget is an example of a(n) task.

a). Unstructured c). Automated

b). Semistructured d). Structured

60. A decision maker examines the organization’s environment for conditions that need decisions
during phase of the decision-making process.

a). Implementation c). Intelligent

b). Choice d). Design

61. Network administrators use technology to have antivirus updates downloaded


on employees’ workstation automatically.

a). Push c). Pull

b). SaaS d). ASP

62. According to Symantec Corporation, in 2008 the number of computer viruses in existence
exceeded one .

a). Hundred thousand c). Million

b). Half million d). Trillion

63. Bluetooth can be used to create .

a). LAN c). PAN

b). WAN d). MAN

64. A Trojan program contains code intended to disrupt a computer, network or Web site, and it is
usually hidden in a(n) program.

a). Popular c). Rarely used

b). Operating system d). Application


65. attacks inundate a Web site or network with e-mails and other network traffic so
that it becomes overloaded and can’t handle legitimate traffic.

a). Denial-of-service c). Virus hoax

b). Identity theft d). Spam

66. During system a preliminary analysis of requirements is done first.

a). Implementation c). Design

b). Planning d). Requirements gathering and analysis

67. Plant management is a strategic management component of an organization.

a). Adhoc c). Semistructured

b). Structured d). Unstructured

68. report nonexistent viruses and may cause panic.

a). Virus hoaxes c). Trojan programs

b). Backdoors d). Worms

69. During the design phase, the design involves selecting a specific platform such a DELL
servers running Ubuntu Linex.

a). CASE c). Physical

b). Hardware d). Logical

70. agents usually track and report on computer equipment and network systems to
predict when a system crash or failure might occur.

a). Fuzzy logic c). Monitoring and surveillance

b). Data mining d). Shopping and information

71. The main objective of is to prevent purchases from the suppliers that are not on
the approved list of sellers and to eliminate the processing of cost purchases.

a). E-precurement c). E-business

b). E-marketing d). Third-party exchange marketplace

72. The most common n-tier architecture involves tiers.

a). Two c). Four

b). Three d). Five

73. A protects new processes.


a). Trademark c). Fair Use Doctrine

b). Patent d). Copyright

74. is understanding the role of information in generating and using business


intelligence.

a). Information literacy c). Transformation processing

b). Computer literacy d). Management information systems

75. A GIS includes which might show a river.

a). Lines c). Points

b). Areas d). Regions

76. You encrypt a message with your key and use an algorithm that hashes the message and creates
a .

a). Plaintext message c). Private key

b). Digital signature d). Message digest

77. A(n) is a type of memory that must be accessed sequentially.

a). Optic disk c). RAID

b). Magnetic disk d). Magnetic tape

78. A(n) database has the ability to represent more complex data relationships that
a relational database.

a). Distributed c). Data-driven

b). Client/server d). Object-oriented

79. Microsoft Internet Explorer (IE). Mozilla Firefox, Google Chrome, Apple Safari, and Opera are
.

a). Directories c). Types of Internet connections

b). Search engines d). Navigation tools

80. Mobile commerce (m-commerce) is based on the protocol.

a). EAP c). WEP

b). WAP2 d). WAP


81. Future progress in includes further development in natural language processing that
should make information systems easier to use.

a). Computer criminals c). Computer literacy

b). Artificial intelligence d). Personal computing power

82. CASE tools are most useful during the phase of the SDLC.

a). Design c). Maintenance

b). Implementation d). Planning

83. A cave automatic virtual environment (CAVE) is a virtual environment consisting of -


shaped room which the walls are rear projection screens.

a). Cylindrical c). Sphere

b). Honeycombed d). Cube

84. scaling refers to adding more workstations (clients).

a). Vertical c). Static

b). Dynamic d). Horizontal

85. The first expert system, called DENDRAL, was developed in the mid- at Stanford
University.

a). 1940s c). 1960s

b). 1950s d). 1970s

86. “ “ means all market participants can trade at the same price.

a). Accessibility c). Price transparency

b). Return on investment d). Customer service

87. WiMAX is based on the IEEE standard.

a). 802.11a c). 802.11n

b). 802.11b d). 802.16

88. are goals and objectives that decision makers establish in order to achieve certain
performances.

a). Intangible milestones c). Governance rules

c). Mission statements d). Criteria


89. With technology, information is sent to users based on their previous inquiries,
interests and specifications.

a). Agent c). Push

b). Smartcard d). Pull

90. A routine table lists .

a). The IP address of the router

b). Nodes on the network

c). The protocol that each nodes umderstands

d). The packets to be sent

91. is collecting date from Web site, usually for competitive intelligence.

a). Phishing c). Data warehousing

b). Data harvesting d). Web harvesting

92. Research and development is an example of a(n) task.

a). Unstructured c). Structured

b). Semistructured d). Automated

93. A decision support system is particularly useful during the phase of the decision-
making process.

a). Design c). Intelligence

b). Choice d). Implementation

94. A(n) works with KBMS to endure that the knowledge base is as up-to-date as possible.

a). Explanation facility c). Heuristic

b). Knowledge acquisition facility d). Meta-knowledge system

95. WiMAX can theoretically go up to speeds of Mbps.

a). 12 c). 40

b). 24 d). 128


96. Bluetooth 3.0 supports a theoretical speed of Mbps.

a). 12 c). 48

b). 24 d). 128

97. A is a hardware device that allows several nodes to share one communication channel.

a). Controller c). Multiplexor

b). Router d). Front-end user

98. An intranet server is placed the DMZ.

a). In front of c). On top of

b). Behind d). In

99. High-level languages represent the generation of computer languages.

a). First c). Third

b). Second d). Fourth

100. E-mail messages are sent using the protocol.

a). POP c). SMTP

b). HTTP d). VoIP

101. An example of analysis involves entering a customer account number and having
the system display the customer’s current balance.

a). Lookup c). Cause-and-effect

b). What-is d). What-if

102. In a bus topology, are used at each end of the cable to absorb the signal.

a). Stoppers c). Emulators

b). Terminators d). Nodes

103. The end results of the phase should give users and top management a clear view
of what the problem is and how the information system will solve the problem.

a). Design c). Planning

b). Prototyping d). Requirements


104. Transaction data for a CRM system might be gathered using .

a). A business plan c). Grocery store loyalty cards

b). Inventory numbers d). A RFID chip

105. The best approach to control the proliferation of invalid and inconsistent data in corporate
databases is controlling the of data.

a). Size c). Amount

b). Flow d). Use

106. A catalog displays product description based on customer’s previous experiences and
preferences.

a). Logical c). Physical

b). Virtual d). Natural

107. The costs of a GSS implementation are high because the system includes many .

a). Communication lines c). Consultants

b). Users d). Features

108. A is built-in to a system by its designer.

a). Logic bomb c). Backdoor

b). Worm d). Virus

109. The layer of the OSI model specifies the electrical connections between computers and
the transmission medium, and defines the physical medium used for communication.

a). Physical c). Data link

b). Session d). Application

110. software, which is more powerful that spreadsheet software, is capable of


performing many types analysis on large amount of data.

a). Graphics c). Presentations

b). Word processing d) Financial planning

111. uses multiple sources of information and provides multidimensional analysis.

a). OLAP c). SQL

b). OLTP d). QBE


112. As part of the phase, the team collects performance data and gathers information
on whether the system is meeting its objectives by talking with users, customers, and other people
affected by the new system.

a). Planning c). Maintenance

b). Requirements gathering and analysis d). Design

113. The supervisor program of an OS is called the .

a). Job manager c) Resource allocator

b). Data manager d). Kernel

114. A(n) system is used to coordinate operations, resources and decision making
between manufacturing, production, marketing and human resource.

a). CRM c). Web portal

b). SCM d). ERP

115. is/are a supporting activity in the value chain.

a). Logistics c). Operations

b). Service d). Technological development

116. Resolving conflicts between two divisions is a tactical management component of an


organization.

a). Structured c). Semistructured

b). Adhoc d). Unstructured

117. The acts as liaison when building a DSS.

a). Model builder c). End users

b). Management designer d). Technical designer

118. payment refers to money or script that is exchanged only electronically.

a). Digital c). Internet

b). Automated d). Electronic

119. have been added to sports gear, such as Tennis and Golf balls and Tennis Rackets,
to make them more durable and improve their responsiveness.

a). Nanometers c). RFID tags

b). Data gloves d). Nanomaterials


120. divides each channel into six time slots.

a). Time Division Multiple Access (TDMA)

b). Mobile Telephone Switching Offices (MTSOs)

c). Transmission Control Protocol (TCP)

d). Code Division Multiple Access (CDMA)

121. InfoHub.com is a(n) Web site.

a). Healthcare c). Travel and tourism

b). Real estate d). Education

122. The Clipboard’s contents are stored on .

a). ROM c). RAM

b). EPROM d). PROM

123. A attack typically targets Internet servers.

a). Worm c). Social engineering

b). Logic bomb d). Denial-of-service

124. RFID tags can be embedded in a sticker or under the skin (human or animal).

a). Active c). Passive

b). Open d). Internal

125. Grouping objects along with their attributes and methods into a class is called .

a). Inheritance c). Distributed processing

b). Replication d). Encapsulation

126. A generates revenue from the fees charged for matching buyers and sellers.

a). Third-party exchange marketplace c). Trading partner agreement

b). Buyer-side marketplace d). Seller-side marketplace

127. Symmetric DSL usually has an upstream rate of Mbps.

a). 1.5 c). 45

b). 24 d). 64
128. main function is to provide information on security incidents, including information
systems’ vulnerabilities, viruses, and malicious programs.

a). The McCumber cube’s c). CERT’s

b). CIRC’s d). Sarbanes-Oxley

129. Microsoft can be used to create and modify a database.

a). Excel c). Word

b). PowerPoint d). Access

130. In backward chaining, the expert system starts with the first.

a). “Else” c). Goal

b). “If” d). Condition

131. A(n) is a peripheral device for recording, storing, and retrieving information.

a). ALU c). Disk drive

b). Motherboard d). Bus

132. is when end users develop their own information system with little or no formal
assistance from the information system team.

a). Outsourcing c). Self-sourcing

b). Sourcing d). Insourcing

133. With the model, users don’t need to be concerned with new software versions and
compatibility problems because the ASP offer the most recent version of the software.

a). SaaS c). CAVE

b). RFID d). VR

134. In the IA field engineers try to discover “Rule-of-Thumb” that enables computers
to perform tasks usually handled by humans.

a). Knowledge c). Data

b). Computer d). Systems

135. To begin designing a relational database, you must define the structure by
defining each table and the fields in it.

a). Logical c). Physical

b). Management d). Security


136. When multiple pieces of data are sent simultaneously, this is communication.

a). Narrowband c). Wide area

b). Broadband d). Modular

137. is a site that facilitates C2C e-commerce.

a). Walmart c). Gap

b). Amazon d). E-Bay

138. The is responsible for specifying data requirements, what models are needed, and how
those models might be used.

a). Managerial designer c). Technical designer

b). Model builder d). End users

139. enables business partners to send and receive information on business transactions.

a). EDI c). Supply chain

b). ERP d). SCM

140. Information technologies include .

a). Internal data c). Twitter

b). The four Ms d). RFID tags

141. , divides a project into smaller functions, and developers can’t go on to the next
phase until the current phase is finished.

a). XP c). RAD

b). Agile d). JAD

142. The component of a ERP system collects and analyses relevant internal and external
data and information.

a). Unified database c). CRM

b). Supply chain d). e-commerce

143. Digitized maps and oriented database are two major components of a GIS.

a). Linear c). Spatially

b). Hierarchical d). Relational


144. Microsoft Access is an example of the component of an information system.

a). External data c). Process

b). Database d). Internal data

145. IBM Freelance is an example of software.

a). Word processing c). Presentation

b). Spreadsheet d). Graphics

146. A helps break down a complex process into simpler, more manageable, more
understandable subprocesses.

a). Data flow diagram c). Conceptual use model

b). Context diagram d). Flowchart

147. Any system connected to the Internet running is subject to a denial of service attack.

a). TLS c). SSL

b). TCP d). UDP

148. In a data flow diagram, processes are indicated with a(n) .

a). Rectangle c). Circle

b). Diamond d). Arrow

149. In data communication, refers to integrating voice, video, and data so that
multimedia information can be used for decision making.

a). Telepresence c). Teleprocessing

b). Dynamic d). Convergence

150. One notable growing application of data communication and convergence is .

a). Teleprocessing c). Cenralization

b). Telepresence d). Convergence

151. intelligence applications might be helpful in the future for handling qualitative decisions.

a). Automated c). Artificial

b). Unstructured d). Structured


152. The Transmission Control Protocol (TCP) operates at the OSI model’s layer.

a). Physical c). Transport

b). Data link d). Network

153. Prototyping is usually done in four steps, the last of which is .

a). Reviewing and evaluating the prototype c). Developing the prototype

b). Defining the initial requirements d). Revising the prototype

154. Users access a DSS through the component.

a). Database c). DSS engine

b). User interface d). Model base

155. A(n) denotes the type of organisation or country the address specifies.

a). TLD c). DNS

b). URL d). IP

156. cables are glass tubes surrounded by concentric layers of glass, called “cladding”, to
form a light path through wire cables.

a). Coaxial c). Fiber-optic

b). Copper line d). Twisted-pair

157. can be used to make sure people don’t vote more than once.

a). Nanotechnology c). RFID tags

b). Biometrics d). Utility computing

158. RFID tags have no internal power supply.

a). Passive c). Active

b). Internal d). Closed

159. plan list the tasks that must be performed to restore damaged data and equipment.

a). Disaster recovery c). Risk assessment

b). Business continuity d). Security compliance

160. Hackers often use phishing to information.

a). Extort c). Delete

b). Intercept d). Modify


161. In a supply chain flow to the supplier.

a). Manufacturing c). Raw materials

b). Customers d). Consumers

162. A database is collection of related that can be stored in a central location or in


multiple locations.

a). Indices c). Data

b). Keys d). Arrays

163. LANs are used most often to .

a). Link computers that are geographically far apart

b). Provide wireless networking services

c). Integrate services, such as e-mailing and file sharing

d). Provide Internet service to cellular phones including smartphones

164. Crisis response is an example of a e-government application.

a). G2B c). G2G

b). G2C d). G2E

165. Input devices send data and information to a(n) .

a). Vacuum tube c). Computer

b). CPU case d). ALU

166. is a common interorganizational system (IOS).

a). RSS feed c). I2

b). Web 2.0 d). EDI

167. The approach to setting up a distributed database addresses how tables are divided
among multiple locations.

a). Data-driven c). Allocation

b). Replication d). Fragmentation

168. A GIS includes which might show the location of an airport.

a). Points c). Regions

b). Areas d). Lines


169. The idea of the value chain was developed in .

a). 1975 c). 1985

b). 1980 d). 1990

170. With you request data from the database by constructing a statement made up
of query forms.

a). The database engine c). Structured query language

b). Query by example d). Select

171. Distributing data among multiple sites minimizes the effect of computer .

a). Fragmentation c). Encapsulation

b). Replication d). Failures

172. Generally, managers perform six tasks for which an EIS is useful. One of these is .

a). Tracking inventory c). Working in groups

b). Communicating via videoconferencing d). Spotting trends

173.A is a computer and all software for managing network resources and offering
services to a network.

a). NAS c). Server

b). SAN d). RAID

174. RFID tags have been decreasing in price and are currently less than per tag.

a). 5 cents c). 50 cents

b). 10 cents d). 1 Dollar

175. AI technology apply to areas that require knowledge, perception, reasoning,


understanding, and cognitive abilities.

a). User requirements c). Strategies

b). Computers d). Manual processes


176. A operation pares down a table by eliminating columns (fields) according to certain
criteria.

a). Select c). Join

b). Project d). Find

177. Intelligent agents demonstrate the capability to select problems or solutions that
need attention and act on them.

a). Reactivity c). Adaptability

b). Collaborative behaviour d). Mobility

178. Amazon.com, suggests products you might enjoy, based on your past browsing and purchasing
habits; this is an example of .

a). Customisation c). Personalisation

b). Customer relationship management d). Supply chain management

179. aims at increasing Web site’s performance on search engines in a natural (and free) fashion.

a). SEO c). Micropayments

b). XML d). Meta tagging

180. CD-ROMs and DVDs are examples of disks.

a). Tape c). Optical

b). Flash d). Magnetic

181. Using the Internet and Web protocols for EDI lowers the cost of documents.

a). Reviewing c). Transmitting

b). Creating d). Storing

182. Transistors were the major technology for the generation of hardware.

a). First c). Third

b) Second d). Fourth

183. Using software, you can perform “what if” analysis on data.

a). Word processing c). Graphics

b). Kernel d). Spreadsheet


184. With the records can be accessed sequentially or randomly, depending on the
number being accessed.

a). Indexed sequential access method c). Hypercube structure

b). Random access structure d). Sequential file structure

185. Organisations with an established IT infrastructure often choose a(n) CRM, which is
implemented much like any other IT system.

a). Local c). Distant

b). Web-based d). On-premises

186. A travels from computer to computer, in a network, but it doesn’t usually erase data.

a). Trojan program c). Worm

b). Virus d). Backdoor

187. In encryption the same key is used to encrypt and decrypt the message.

a). Nonrepudiation c). Asymmetric

b). TLS d). Symmetric

188. was developed so that users could communicate with computers in their own
language.

a). ANN c). Visual catalog technology

b). Personal agent technology d). NLP

189. One major obstacle to using VR technology is that not enough are currently available.

a). Computers c). Nanomaterials

b). Educated users d). Fibre optic cables

190. ASCII defines up to characters.

a). 8 c). 258

b). 128 d). 1024

191. perform well at simple, repetitive tasks and can be used to free worker from tedious
or hazardous jobs.

a). Natural language processors c). Robots

b). Natural networks d). Knowledge bases


192. searches for specific information or patterns, using input from multiple business
partners and data sources.

a). Knowledge management c). Personalization

b). Collaboration filtering d). Customersation

193. Shopping and agents help users navigate through the vast resources available on
the Web.

a). Information c). Open-source

b). Lookup d). Public

194. The first generation computer language consists of a series of representing data
or instructions.

a). 1s c). Macros

b). 0s d). 0s and 1s

195. The embedded references in hypermedia documents are called .

a). Hypertext c). Hyperareas

b). URLs d). Text media

196. security measures use a physiological element to enhance security measures.

a). Social engineering c). Alternative

b). Biometric d). Biofeedback

197. , consists of rules related to a problem or discipline.

a). Expert Knowledge c). Factual knowledge

b). Heuristic knowledge d). Meta-knowledge

198. Java and C++ are Computer languages.

a). Fourth generation c). Assembly

b). Firth generation d). High-level

199. Mergers are a strategic management component of an organization.

a).Unstructured c). Structured

b). Ad hoc d). Semistructured


200. Spamming has created concerns, because e-mail often contain explicit language or
nudity.

a). Privacy c). Sniffing

b). Decency d). Fraud

201.The most widely used input device is the .

a). Keyboard c). Touch screen

b). MICR d). Mouse

202. offers a 3-D virtual reality platform.

a). Active Worlds c). Habbo

b). Second Lift d). Runescape

203. OSs allows several users to use computer resources simultaneously.

a). Hierarchical c). Web-driven

b). Kernel d). Time-shared

204. The most common data model is the model.

a). Relational c). Hierarchical

b). Object-oriented d). Network

205. A(n) is the link between devices connected to the computer.

a). Logic unit c). Control unit

b). Bus d). ALU

206. The layer of the OSI model generates the receiver’s address and ensures the integrity of
messages by making sure packets are delivered without error, in sequence, and with no loss or
duplication.

a). Presentation c). Transport

b). Application d). Session

207. In conversion, the old and new systems run simultaneously for a short time to ensure
that the new system works correctly.

a). Phased-in-phased-out c). Plunge

b). Parallel d). Pilot


208. A(n) is a type of Web site that allows users to add, delete and sometimes modify
content.

a). Blog c). Wiki

b). RSS feed d). Social networking site

209. In an expert system, a(n) engine is similar to the model base component of a decision
support system.

a). Factual c). Inference

b). Explanation d). Knowledge

210. The Internet2 (12) project started in 1987 and has been planned as a(n) network.

a). Open-source c). Centralized

b). Static d). Decentralized

211. is a popular on-line payment system used in many on-line auction sites.

a). Smart card c). E-cash

b). E-Wallet d). PayPal

212. is registering, selling, or using a domain name to profit from someone else’s trademark.

a). The Unfair Use Doctrine c). Cyberbullying

b). The digital divide d). Cybersquatting

213. robots have limited mobility, limited vision, and some speech capabilities.

a). Industrial c). AI

b). Toy d). Personal

214. A GIS uses data.

a). Spatial and nonspatial c). Regional

b). Buffered d). Relative

215. With outsourcing, the organisation chooses an outsourcing company in the same
country.

a). Offshore c). Nearshore

b). Inshore d). Onshore


216. Within the technique for wireless security, a user’s computer and the AP use a master
key to negotiate for a key that will be used for a session.

a). EAP c). WPA

b). WPA2 d). WEP

217. computing is a platform incorporating many recent technologies under one platform.

a). Utility c). On-demand

b). Grid d). Cloud

218. introduced the value chain concept.

a). Bill Gates c). Tim Berners-Lee

b). Tom Watson d). Michael Porter

219. is an electronic version of a paper check.

a). E-paper c). E-check

b). E-cash d). E-wallet

220. The Internet started in .

a). 1950 c). 1987

b). 1969 d). 1994

221. Which term describes one user viewing one ad?

a). Banner ad c). Click

c). Ad view d). Ad impression

222. Users interact via avatars in a(n) .

a). Virtual world c). Telepresence system

b). Cloud computing environment d). RFID system

223. Data encryption transforms data into a scrambled form called .

a). Ciphertext c). Message digest text

b). Plaintext d). Cleartext


224. A is available for most handheld devices.

a). E-paper c). E-wallet

b). E-cash d). E-check

225. Many organizations now follow the model to form teams that can handle network
intrusions and attacks quickly and effectively.

a). CERT c). The McCumber cube

b). CIRC d). Sarbanes-Oxley

226. The component of an expert system is important because it helps give users confidence
in the system’s results.

a). Meta-knowledge system c). Explanation facility

b). Knowledge acquisition facility d). Heuristic

227. systems have been one of the most successful AI-related technologies.

a). Expert c). MIS

b). Agent d). NLP

228. The amount of data that can be transferred from one point to another in one second is called
.

a). Modem c). Bandwidth

b). Protocol d). Attenuation

229. A database the heart of DBMS software is responsible for data storage, manipulation,
and retrieval.

a). Definition c). Engine

b). System d). Application

230. In the model, each record can have multiple parents and multiple children.

a). Hierarchical c). Network

b). Relational d). Integrity


231. The intervention aspect of a(n) reduce communication barriers and introduce
order and efficiency into situations that are inherently unsystematic and ineffective.

a). EIS c). DSS

b). GSS d). GIS

232. The Internet has improved productivity in many organizations, but this improvement must be
converted to .

a). Exposure c). Profitability

b). Value d). Cash flow

233. is a pure-play company.

a). BarnesandNobel.com c). Walmart.com

b). GAP.com d). Amazon.com

234. Accessing one central database server could increase for remote users.

a). Communication costs c). Productivity

b). Processing speed d). Error rates

235. The document is created during the requirements-gathering and analysis phase.

a). CBA c). System specification

b). JAD d). Maintenance plan

236. A , market concentrates on a specific function or business and automates this function
or process for different industries.

a). Horizontal c). Two-dimensional

b). Vertical d). Targeted

237. Online brokerage firms operate in a highly competitive environment, so they use information
technologies to make their services more unique in order to combat .

a). Supplier power c). Buyer power

b). Threats of new entrants d). Rivalry among existing competitors

238. Using the , model brings sellers and buyers together on the Web and collects
commissions on transactions between these parties.

a). Merchant c). Advertising

b). Brokerage d). Mixed


239. In service organisation, the link in the supply chain includes .

a). Management c). Software

b). Hardware d). Service provider

240. Intentional threats include .

a). User’s accidental deletion of data c). Floods

b). Power outages d). Attack by disgruntled employees

241. In a(n) file, each alphabetic, numeric, or special character is represented with a 7-
bit binary number.

a). EBSDIC c). Unicode

b). ASCII d). Extended ASCII

242. A company can purchase a(n) package that might include service from different
vendors, but the e-distributor coordinated them into one package for customers.

a). Supply chain management c). Electronic data interchange

b). Enterprise resource planning d). Maintenance, repair, and operations

243. can be conducted (wired or guided) or radiated (wireless).

a). Communication media c). Communication networks

b). Attenuation d). Protocols

244. A decision support system is a(n) information system consisting of hardware,


software, and models designed to assist decision makers in the organization.

a). Interactive c). Virtual

b). Artificial d). Static

245. Passive tags usually last longer than active tags; the best ones have about of battery
life.

a). 30 days c). 10 years

b). 1 year d). 20 years

246. In Grid computing, each participant in a grid is referred to as a .

a). CAVE c). Node

b). Cell d). Tag


247. Generally, laws protect tangible material, such as books and drawings.

a). Logo c). Trademark

b). Patent d). Copyright

248. The final results of the economic feasibility study is the report.

a). Net present value c). Payback

b). Cost-benefit analysis d). Internal rate of return

249. Sometimes an information system needs to be designed from scratch, and the
model is particularly suitable in these situations.

a). RAD c). Dataflow

b). Self-sourcing d). SDLC

250. The operator searches for records that don’t meet the condition.

a). AND c). MIS

b). NOT d). OR

You might also like