QUESTION 1
1. What is
the process of analyzing data to identify trends, patterns, and other useful
information?
A. Data mining
B. Digging agent
C. Database modeling
D. Querying
E. Clustering
QUESTION 2
1. Which of
the following is basically the acquisition of software via a subscription
model?
A. BPaaS
B. SaaS
C. PaaS
D. IaaS
E. Virtualization
QUESTION 3
1. Each
computer attached to a network or the Internet has a unique address called a(n)
________.
A. IP address
B. local address
C. network address
D. PC address
E. Internet address
QUESTION 4
1. What are
cookies?
A. Small text files that store
information
B. Review IP address to track online
browsing
C. Hidden application to record
keystrokes
D. Malware designed to slow down your
PC
E. Program offered by an organization
which post rules
QUESTION 5
1. When you
click on a ___________ on your universityâs homepage, your browser sends a
request to the Web server that houses the requested page.
A. HTTP
B. hyperlink
C. desktop
D. server
E. protocol
QUESTION 6
1. What is
the main difference between the initial set of web applications and Web 2.0?
2.
3. A. interactivity
4.
5. B. speed
6.
7. C. bandwidth requirements
8.
9. D. software requirements
10.
11. E. technology
QUESTION 7
1. The
fastest transmission speeds on cables for a wired network are ______________,
while ___________ are the slowest.
A. coaxial, fiber
B. fiber, copper
C. copper, coaxial
D. copper, fiber
E. fiber, coaxial
QUESTION 8
1. When
considering security threats it is very important to consider __________ and
__________ of the threat on the organization.
impact,
theft
prevalence,
impact
repudiation,
availability
authenticity,
availability
theft,
prevalence
QUESTION 9
1. Which
phase of SDLC begins the process?
Requirements
Planning
Development
Implementation
Maintenance
QUESTION 10
1. Encryption
is not only used to protect data transmissions, but it can also be used to:
lock
out users
protect
data on servers
identify
viruses
update
email
take
photographs
QUESTION 11
1. In
contrast to ________, ERP applications make accessing information easier by
providing a central information repository.
legacy
systems
custom
applications
off the shelf applications
data warehouses
database
management systems
QUESTION 12
1. What is
one of the core characteristics of the Internet that has contributed to its
rapid growth?
interoperability
addressing
Internet
Protocol
IPv4
fiber
optics
QUESTION 13
1. Biometrics
are primarily used for one of two things. What are they?
Authentication,
identification
Non-repudiation,
authentication
Fingerprint
recognition, iris recognition
Account
access, recognition
User
rights, printing services
QUESTION 14
1. What type
of architecture can be used in different systems with different technology
platforms?
A. Service Oriented Architecture
B. peer-to-peer
C. Software as a Service (SaaS)
D. Intranet
E. VPN
QUESTION 15
1. What is
the process of identifying, assessing and prioritizing the security risks an
organization may face?
Risk
management
Virus
Risk
Wi-Fi
Protected Access
Security
Preventative
Controls
1
QUESTION 16
1. An
important B2C enabler that allows for users that use a wide variety of
platforms to access businesses that also use different platforms is:
Interoperability
OS
specific
Platform
based
Bandwidth
E-business
QUESTION 17
1. What do
the operational components of a CRM accomplish?
Improve
day to day interactions with customers
Lower
overall cost of production
Identify
customer preferences
Automate
customer responses
Determine
product location
QUESTION 18
1. What type
of decision is routine and repetitive and often has well-defined procedures for
dealing with them?
Unstructured
Structured
Semi-structured
Unusual
Control
1 points
QUESTION 19
1. If a
virus is embedded in a legitimate file, they are often called a(n)__________.
worm
Trojan
horse
hack
theft
active
content
QUESTION 20
1. The AARP,
an organization that caters towards people over the age of 50, uses its
membersâ information to place them into very small groups for the purpose of
identifying marketing opportunities.
This is an example of what?
Customer
profiling
Customer
segmentation
Customer
grouping
Client
profiling
Client
segmentation
QUESTION 21
1. In order
for you to enter the server room at your office you must have a key to the
room, and then you must have a proper user name and password to access the
server. All of the student files on the server are encrypted. What is this
called?
Layered
security
Overkill
Defense
in depth
Organizational
policy
Information
security
QUESTION 22
1. When
verifying that the solution solves the problem at hand, you must be sure that
the alternative meets all __________ and best meets the _________.
requirements,
goals
requirements,
needs
goals,
wants
solutions,
vision
problem,
definition
QUESTION 23
1. When you
shop online, what is an indication that the transaction is secure?
http://
https://
ftp://
smtp
POP3
QUESTION 24
1. Cloud
computing allows organizations to rent computing resources from providers
instead of having their own locally managed __________ and __________.
hardware,
software
hardware,
human resources
network,
software
Web
2.0, Web 3.0
websites,
servers
QUESTION 25
1. In
February of 2011 the Internet Assigned Number Authority (IANA) assigned the
last block of IPv4 addresses. What is the new address standard?
IPv5
IPv6
MAC
address
DARPA
virtual
address
QUESTION 26
1. When
considering decision making techniques/tools, which tool requires you to
evaluate each alternative against all other alternatives?
Pros/cons
analysis
Paired
comparison
Deep
research
Decision
Criteria
Requirements
QUESTION 27
1. What
allows one physical device such as a server or computer to operate as if it was
several machines?
Software
as a Service
Service
Oriented Architecture
virtualization
Web 2.0
unified
communications
QUESTION 28
1. Which of
the provides a cloud-based platform for running websites and databases and
executing programming languages?
BPaaS
SaaS
PaaS
IaaS
Virtualization
QUESTION 29
1. You have
been included on an IT task force for your university. The committeeâs first
priority is wireless access on your campus. The task force chair keeps
discussing increasing enrollment numbers. What principle of architecture is the
chair most likely alluding to?
ease of
implementation
flexibility
control
scalability
security
QUESTION 30
1. After
reviewing table after table of data for your marketing research project, you
can no longer make much sense of most of the information. What type of tool
would be able to help you uncover trends in the data?
Dedicated
statistical software
DBMS
Document
management software
Data
visualization software
Reporting
tools
QUESTION 31
1. Methods
to improve a site’s ranking in search engine results are referred to as:
Search
engine optimization
Search
marketing
Conversion
rate
Pay per
click
Click
through ads
QUESTION 32
1. Auto
makers spend a significant amount of time and money developing new automobiles.
Often these auto makers create a working mock up for display and testing. What
methodology are these automakers using?
Prototyping
Modeling
Maintenance
Spiral
Model
Off the
shelf
QUESTION 33
1. A
connection that uses encryption and other channels to provide a secured channel
over an open wire connection is called a(n):
smpt
network
Symmetric
network
Virtual
private network
Bridged
network
Switched
network
QUESTION 34
1. Transaction
Processing Systems (TPS) can make decisions using predetermined rules and
processes. This is an example of a(n)
_________ decision of a(n) ____________ control.
unstructured,
operational
structured,
operational
semi-structured,
managerial
unstructured,
managerial
structured,
strategic
QUESTION 35
1. Many
cities across the Unites States are considering fiber networks that would
connect commercial and residential areas to a single network. This would be
what kind of network?
LAN
PAN
WLAN
WAN
CAN
QUESTION 36
1. ___________
are used to determine how well each alternative meets a particular goal or
requirement.
Analysis
Comparison
Criteria
Technique
Tool
QUESTION 37
1. EDI
refers to the _______________ sharing of information between two businesses in
a standard format.
electronic
paper
classified
organized
direct
QUESTION 38
1. Innovators
are working on Web 3.0. What type of new technology is expected from Web 3.0?
virtualization
instant
gratification
signatures
procedures
semantics
QUESTION 39
1. What is
the term for a computer or a router that controls access in and out of the
organizationâs networks, applications, and computers?
Switch
Bridge
Gateway
Firewall
Hub
QUESTION 40
1. ___________
involves making sure that information or data can only be accessed by
individuals with authorized access.
Integrity
Availability
Confidentiality
Authenticity
Non-repudiation
QUESTION 41
1. ______________
software is software that allows users to access the underlying source code for
an application.
COTS
Custom-built
Developed
Open
source
Hybrid
QUESTION 42
1. Valerie
has decided to purchase her first home. Before she begins looking at houses,
she has chosen to review her budget, and has decided on a very specific number
that she is comfortable with for her monthly mortgage payment. What kind of
analysis has Valerie done?
What-if
analysis
Goal
seeking analysis
Paired
comparison
Pros/cons
Decision
Matrix
QUESTION 43
1. Your
national office of your student organization has established a Portal for you
to track news, memos, and download forms. What kind of system does this most
closely describe?
Decision
support system
DBMS
Reporting
tools
Document
management tools
Paired
comparison
s
QUESTION 44
1. A Web
merchant wants to ensure that people cannot deny that they entered into a
transaction, so they starting using digital signatures and encryption as part
of their transaction processing. This
is an example of what?
Integrity
Availability
Confidentiality
Authenticity
Non-repudiation
1
QUESTION 45
1. What is a
more recent and more powerful encryption algorithm widely available in most
routers?
WEP
WPA
https
Symmetric
encryption
Stealth
QUESTION 46
1. What is
the biggest challenge with ERP systems?
Customizing
it to the needs of the organization
Efficiency
of the system
Cost of
the implementation
Customer
support
Production
time lost
QUESTION 47
1. When
registering online for your classes you log onto to a website provided by your
university. The computer and web browser that you are using acts as a
_________, while the university computer acts as a ___________.
client,
server
server,
client
computer,
server
browser,
client
client,
application
QUESTION 48
1. The
Institutional Research department at your university gathers data on nearly
everything on campus. At first the department used spreadsheets to maintain the
data, but more sophisticated statistical methods are required for the data.
What type of tool does the Institutional Research department likely need?
Reporting
tools
What-if
analysis
Dedicated
statistical software
Data
visualization software
DBMS
QUESTION 49
1. What is
the second phase of Simonâs Information Systems and Decision model which
requires developing alternative approaches to bringing about the required
change?
Intelligence
Design
Choice
Implementation
Knowledge
QUESTION 50
1. You step
out of your office and miss a telephone call. When you sit at your desk you
notice that the voicemail light is blinking on your phone, you have a new
email, and you have a transcribed instant message on your computer screen in
the form of an Instant Message. Your organization has most likely adopted what
type of technology?
intranet
VPN
wireless
unified
communications
Web 3.0
QUESTION 51
1. What
describes a series of actions that result in an outcome for an actor?
Outsourcing
Use
case
Requirements
Planning
Development
QUESTION 52
1. ___________
involves making sure that data are consistent and complete.
Integrity
Availability
Confidentiality
Authenticity
Non-repudiation
QUESTION 53
1. Strategic
planning often involves _____________ decisions because it is very difficult to
anticipate the information needs of managers involved in strategic planning.
structured
flexible
controlled
strategic
unstructured
QUESTION 54
1. The
Internet has been the contributor to a global platform where organizations
across the world can compete for customers and gain access to new __________.
competitors
markets
revenues
employees
Media
QUESTION 55
1. Using a
unique username and a complicated password is one possible method to verify
that a user is who they say they are. What type of goal is this?
Non-repudiation
Authenticity
CIA
Availability
Privileges
1
QUESTION 56
1. Which of
the following is not a disadvantage of an ERP system?
They
require an enormous amount of work.
They
are expensive.
It may
not work better than the previous system.
They
may require redesigned business processes.
Users
may resist implementation.
QUESTION 57
1. What kind
of threat renders a system inoperative or limits its capability to operate?
Denial
of service
Unauthorized
access
Theft
and fraud
Forceful
Passive
QUESTION 58
1. When
using your cell phone, what type of transmission are you using?
infrared
Bluetooth
microwave
radio
cable
1
QUESTION 59
1. Search
engine results achieved by design and search engine optimization are known as
______.
Sponsored
links
Pay-per-click
Keyword
bidding
Search
engine optimization
Organic
links
QUESTION 60
1. You are
asked to provide your location and email address when downloading iTunes from
the Apple site. You are also prompted to check a box if you would like any
Apple News updates. This checkbox allows you to do what?
Opt-in
Create
account
Opt-out
Enable
cookie manager
Identify
data collection threat
QUESTION 61
1. What is a
primary focus of supply chain management (SCM)?
Inventory
cost reduction
Increased
level of customer support
Sales
tracking
Outsourcing
manufacturing
Unified
communication
1
QUESTION 62
1. ____________
refers to having some level of control over potential secondary uses of oneâs
personal information.
Information
privacy
Information
security
Information
assurance
Data
collection threat
Accessibility
QUESTION 63
1. Which of
the following refers to security solutions that protect access to systems,
applications, or data by ensuring users or systems are authenticated and
allowed to have such access?
Physical
access controls
System access
controls
User
profiles
Logical
access controls
Account
management
QUESTION 64
1. Which of
the following allows companies to pass the operation of their computer systems
to another company?
BPaaS
SaaS
PaaS
IaaS
Virtualization
QUESTION 65
1. ____________
is when firms are able to maintain the lowest level of inventory while still
being able to fulfill demand.
Supply
Chain Management
Inventory
flow management
Just-in-time
inventory
Inventory
scheduling
Inventory
capacity management
QUESTION 66
1. What is
the most critical phase in the detailed decision making process?
Identify
and clearly define the problem
Determine
requirements and goals
Identify
alternatives
Define
the criteria
Select
a decision making technique
QUESTION 67
1. You have
received an email from your university IT department stressing that the IT
department will NEVER ask you for your username and password to your email
account. What type of scheme is the university most likely trying to protect
you from?
Phishing
Smurfing
Spoofing
Break-ins
Security
holes
QUESTION 68
1. Search
engine results where companies pay for placement are known as ______.
Sponsored
links
Pay-per-click
Keyword
bidding
Search
engine optimization
Organic
links
QUESTION 69
1. As the
amount of structure in a decision __________, the need for flexibility
__________ .
decreases,
increases
increases,
decreases
decreases,
decreases
increases,
increases
none of
the above
QUESTION 70
1. The
systems development committee has chosen to implement the new system in a
limited number of sites based on location. What type of integration plan is
being implemented here?
Direct
Changeover
Parallel
Operation
Phased
implementation
Pilot
Operation
Use
Case
QUESTION 71
1. A system
that has been accessed illegally is a victim of ___________.
theft
and fraud
unauthorized
access
careless
behavior
denial
of service
automation
tools
QUESTION 72
1. What term
is used to refer to someone (or something) pretending to be someone else (or
another computer)?
Phishing
Spoofing
Smurfing
Porting
Break-in
QUESTION 73
1. Privacy
of information is the ___________ of the ___________ collected by organizations
about the individuals using their services.
confidentiality,
information
collection,
data
protection,
knowledge
certification,
wisdom
privacy,
information
QUESTION 74
1. Statistical
analysis emphasizes ______________ models, while data mining tries to
____________ the models.
concludes,
organize
preexisting,
discover
definition,
explain
described,
structure
explicit,
recreate
QUESTION 75
1. Information
security is not just about technology, but also about management and _________
.
hardware
software
people
networks
policies
QUESTION 76
1. On a
recent trip to my local grocery store, I noticed that ping pong balls are
available for sale in the same aisle where beer and other spirits are sold.
What component of a CRM likely made the management at this store consider
placing these items next to each other?
Operational
Collaborative
Analytical
Direct
Unified
QUESTION 77
1. __________
refers to mass collaboration of information to solve a problem.
social
networking
collaborative
content
unified
communications
Really
Simple Syndication
Crowdsourcing
QUESTION 78
1. _______________
is a set of applications, technologies and processes for gathering, storing,
analyzing, and accessing data to help users make better decisions.
EIS
Business
intelligence
Data
mining
A
discussion database
Groupware
QUESTION 79
1. What are
the two types of cryptography systems used in encryption today?
Asymmetric,
symmetric
Accurate,
accessible
Threat,
solution
Analog,
digital
Private,
public
QUESTION 80
1. As a
manager at your University Bookstore, you often run weekly inventory reports
that give you lists of inventory on hand as well as inventory sold over the
past week. The reports are run from data stored within the database management
system (DBMS) of the Bookstore. What type of information retrieval tool are you
using when running the report?
Reporting
tools
Document
management tools
Decision
Support System
Decision
Matrix
Pro/cons
analysis
Our Service Charter
-
Excellent Quality / 100% Plagiarism-Free
We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers. -
Free Revisions
We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed. -
Confidentiality / 100% No Disclosure
We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service. -
Money Back Guarantee
If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit. -
24/7 Customer Support
We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.