Madalyn Geuke
Quiz von , erstellt am more than 1 year ago

This is a practice exam for the final in CIS200 at Colorado State University

107
0
0
Madalyn Geuke
Erstellt von Madalyn Geuke vor etwa 9 Jahre
Schließen

CIS 200

Frage 1 von 66

1

When a user clicks on a hyperlink in a web page, they will see a new page. That page was viewable because _____ interpreted the hyper-­text markup language to display it properly.

Wähle eine der folgenden:

  • The 3 ­tier architecture

  • A web browser

  • A URL

  • A domain name

  • A web server

Erklärung

Frage 2 von 66

1

The five components of an information system consists of computer hardware, software, data, people, and ________.

Wähle eine der folgenden:

  • Bugs

  • Device drivers

  • Procedures

  • tools

Erklärung

Frage 3 von 66

1

A ________ is a text document written in HTML (Hyper-­Text Markup Language).

Wähle eine der folgenden:

  • web server

  • web browser

  • web page

  • web site

Erklärung

Frage 4 von 66

1

The "S" in HTTPS stands for _____?

Wähle eine der folgenden:

  • site

  • segmented

  • secure

  • social

Erklärung

Frage 5 von 66

1

Which of these is a data communications protocol?

Wähle eine der folgenden:

  • SOHO (Small office/home office)

  • LAN (Local Area Network)

  • Bluetooth

  • DSL (Digital Subscriber Line)

  • Cable internet connection

Erklärung

Frage 6 von 66

1

By providing Google Drive, Calendar, and other applications, Google is providing _______.

Wähle eine der folgenden:

  • Platform as a service (PaaS)

  • Content

  • Software as a service (SaaS)

  • A private cloud

  • Infrastructure as a service (IaaS)

Erklärung

Frage 7 von 66

1

Which of the answers best defines an Management Information System (MIS)?

Wähle eine der folgenden:

  • The methods you use to start the program, enter your report print it, and save and back up your file

  • A group of components that interact to achieve some purpose

  • A model of the components of an information system

  • The management and use of information systems that help organizations achieve their strategies

Erklärung

Frage 8 von 66

1

What is collaboration?

Wähle eine der folgenden:

  • Similar to cooperation, where people agree upon what needs to be done.

  • A group working together to accomplish a task in less time than if one person were doing the work.

  • An approach to working, which includes people who have similar opinions and compatible personalities.

  • An approach to working in which each member is assigned a task to be worked on individually.

  • A group working together in which all members of the group work together to meet a goal.

Erklärung

Frage 9 von 66

1

Attributes of good website design are _____.

Wähle eine der folgenden:

  • all answers given.

  • good spelling and grammer, intuitive navigation, easy­-to­-remember domain name.

  • Useable, attractive, easy to navigate, with great content.

  • nice colors, sellable, useable, good content.

Erklärung

Frage 10 von 66

1

Metadata is _________.

Wähle eine der folgenden:

  • information that describes the data

  • hidden data that travels with the digital container of data

  • is available for JPG photos

  • data about data

  • all answers given

Erklärung

Frage 11 von 66

1

When a company posts a privacy policy, it ensures that the company keeps confidential all the information it collects.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 12 von 66

1

Devices running iOS or Mac OS do not get viruses, worms or internet malware.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 13 von 66

1

To use a photo on your website, it must NOT be owned by someone else.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 14 von 66

1

What is a business process?

Wähle eine der folgenden:

  • None of the answers

  • The analysis and redesign of workflow within and between enterprises

  • A standardized set of activities that accomplish a specific task, such as processing a customer's order

  • Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations

Erklärung

Frage 15 von 66

1

A web address such a www.google.com is called __________.

Wähle eine der folgenden:

  • A URL

  • The server tier

  • A public IP address

  • A domain name

Erklärung

Frage 16 von 66

1

Which of the following is a definition of information?

Wähle eine der folgenden:

  • Data

  • Facts

  • Knowledge derived from data

  • Figures

  • Research

Erklärung

Frage 17 von 66

1

Internet Service Providers (ISP) are responsible for all except __________.

Wähle eine der folgenden:

  • A gateway to the Internet

  • Security of your messages

  • Providing a legitimate internet address

Erklärung

Frage 18 von 66

1

Because thin-­client applications run in web browsers, ____.

Wähle eine der folgenden:

  • The user must have the browser for which the application was developed

  • There will be a different version of the application for each type of browser

  • They are usually obtained via an app store like Apple Store or Google Play.

  • They will have only one version of code developed by a single team of programmers

  • It is impossible to provide any sophisticated processing

Erklärung

Frage 19 von 66

1

In a company, making the information system more secure will most likely increase the personal freedom of the employees.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 20 von 66

1

A set of guidelines that allow different types of devices to communicate with each other is called a ____.

Wähle eine der folgenden:

  • process

  • language

  • modern

  • protocol

Erklärung

Frage 21 von 66

1

Net neutrality refers to the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 22 von 66

1

The photo file formats (file types) are best for website display EXCEPT ______.

Wähle eine der folgenden:

  • Gif

  • Pst

  • Png

  • Jpeg

Erklärung

Frage 23 von 66

1

A ________ monitors data flowing over computer network links, such as email, looking for company confidential data.

Wähle eine der folgenden:

  • sniffer

  • phisher

  • safegaurd

  • hacker

Erklärung

Frage 24 von 66

1

What is the purpose of a responsive web design?

Wähle eine der folgenden:

  • It allows one web site to serve different platforms, such as tablets, PCs, and mobile phones.

  • It enables web sites to customize design according to user preferences.

  • It enables web sites to customize content based on user location and preferences.

  • It allows web sites to respond quickly to changing user needs.

Erklärung

Frage 25 von 66

1

With ___, in addition to using the software for free, a user could also modify the code to create a new version of the software.

Wähle eine der folgenden:

  • Virtualization

  • Vertical market applications

  • Open Source

  • Horizontal market applications

  • closed source

Erklärung

Frage 26 von 66

1

The password like "C4t...................." (23 characters) would take longer to crack than "PrXyu.S(bk7$LlVDFP8" (19 characters).

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 27 von 66

1

The development of _________ must come before the development of ______.

Wähle eine der folgenden:

  • information; data

  • data; software

  • computer software; information technology

  • information systems; information technology

Erklärung

Frage 28 von 66

1

Organizations can defend against threats by implementing data, technical, and ___ safeguards.

Wähle eine der folgenden:

  • Control

  • Infrastructure

  • Key

  • Hacking

  • Human

Erklärung

Frage 29 von 66

1

Which of the following is not a common example of a wireless device?

Wähle eine der folgenden:

  • Cellular phone

  • Bluetoooth

  • Ethernet

  • RFID

Erklärung

Frage 30 von 66

1

The 1 K used when measuring network speed is the same number as the 1K to measuring memory/storage space on a computer.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 31 von 66

1

Some cloud vendors offer applications as well as hardware infrastructure, this is known as ________.

Wähle eine der folgenden:

  • Content delivery network (CDN)

  • Software as a service (SaaS)

  • Service-­oriented architecture (SoA)

  • Infrastructure as a service (IaaS)

  • Platform as a service (PaaS)

Erklärung

Frage 32 von 66

1

Data can be represented using light because the computer can understand ____ values.

Wähle eine der folgenden:

  • 1

  • 8

  • 0 (zero)

  • 2

  • 1024

Erklärung

Frage 33 von 66

1

Which storage medium is considered volatile?

Wähle eine der folgenden:

  • Flash drive (Thumb drive)

  • CD-ROM

  • Main memory or RAM

  • DVD

Erklärung

Frage 34 von 66

1

Theft, terrorist activity, and accidents could all result in ___________.

Wähle eine der folgenden:

  • Procedural mistakes

  • Advanced persistent threats

  • Loss of infrastructure

  • Incorrect data modification

  • Incorrect data recovery

Erklärung

Frage 35 von 66

1

Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.

Wähle eine der folgenden:

  • social engineering

  • phishing

  • sniffing

  • hacking

Erklärung

Frage 36 von 66

1

In the cloud, the use of hardware components is allocated and reallocated among many different companies; these pooled resources are shared through _____________.

Wähle eine der folgenden:

  • hosting

  • virtualization

  • interfaces

  • servers

  • economies of scale

Erklärung

Frage 37 von 66

1

The key characteristics of a LAN are __________.

Wähle eine der folgenden:

  • It connects computers across multiple geographical areas

  • All of the computers are located on property controlled by the organization that operates the LAN

  • It uses Ethernet

  • A wireless router is required for connecting the devices on the LAN

  • It uses Bluetooth to connect the devices on the LAN

Erklärung

Frage 38 von 66

1

Which of the following is NOT included in a company­-wide security policy?

Wähle eine der folgenden:

  • Whether data will be stored with other organizations.

  • What employees can do with their own mobile devices at work.

  • How employees and others can obtain copies of data stored about them.

  • Personnel policies.

  • How employees and others can request changes to inaccurate data.

Erklärung

Frage 39 von 66

1

Which answer is NOT TRUE for information technology _____

Wähle eine der folgenden:

  • is the integration of computer with telecommunication equipment for storing, retrieving, manipulating and storage of data.

  • is literally a subset of information systems.

  • the study, design, development, application, implementation, support or management of computer-­based information systems.

  • consists of people, processes, hardware, data, machines and software.

Erklärung

Frage 40 von 66

1

A device on the Internet is identified by its __________.

Wähle eine der folgenden:

  • SMTP

  • URL

  • domain name

  • IP address

  • protocol

Erklärung

Frage 41 von 66

1

Which of the following statements about information systems is true?

Wähle eine der folgenden:

  • People are easy to manage through information systems.

  • Procedures are stable and don’t change often

  • Hardware failures cannot be managed through design

  • Software is difficult to build.

Erklärung

Frage 42 von 66

1

Which of the following is an example of a security threat resulting from malicious human activity?

Wähle eine der folgenden:

  • an employee who accidentally deletes customer records

  • an employee who misunderstands operating procedures

  • an employee who inadvertently installs an old database on top of the current one

  • an employee who intentionally destroys data or other system components

Erklärung

Frage 43 von 66

1

A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

Wähle eine der folgenden:

  • key escrow

  • intrusion detection system

  • account administration system

  • malware definition

Erklärung

Frage 44 von 66

1

As a general rule, native applications ____.

Wähle eine der folgenden:

  • Are easy to develop

  • Are similar to thin­-client applications

  • Are developed as web pages

  • Easily adapt to any operating system

  • Are expensive to develop

Erklärung

Frage 45 von 66

1

___% of the web is visible to a Google, Bing or Yahoo search.

Wähle eine der folgenden:

  • 50

  • 95

  • 35

  • 5

Erklärung

Frage 46 von 66

1

The World Wide Web and Internet are the same thing.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 47 von 66

1

If an organization uses cloud services that provide hardware, an operating system, and a Data Base Management
System (DBMS), but has to provide their own applications, they are using _____.

Wähle eine der folgenden:

  • Hardware as a service (HaaS)

  • Platform as a service (PaaS)

  • A private cloud

  • Software as a service (SaaS)

  • Infrastructure as a service (IaaS)

Erklärung

Frage 48 von 66

1

"URL" stands for ____?

Wähle eine der folgenden:

  • Ultra Reliable Linkage

  • Unique Real Link

  • Uniform Resource Locator

  • User Responsibility Liability

Erklärung

Frage 49 von 66

1

IoT stands for

Wähle eine der folgenden:

  • Input­-Output Technology

  • Internet of Things

  • I am On Target

  • Input-­Output Testing

Erklärung

Frage 50 von 66

1

The rest of the web that Google, Bing, or Yahoo does not search is called ___________.

Wähle eine der folgenden:

  • The mystery web

  • The illegal web

  • The dark web

  • It doesn't have a name because there is no part of the web Google, Bing, and Yahoo do not search.

  • The other web

Erklärung

Frage 51 von 66

1

_____ are the basic building blocks of a relational database.

Wähle eine der folgenden:

  • reports

  • queries

  • tables

  • forms

Erklärung

Frage 52 von 66

1

Each row in a table contains all the data for a single ___.

Wähle eine der folgenden:

  • query

  • record

  • form

  • field

Erklärung

Frage 53 von 66

1

Each column in a table represents a single value called a ___.

Wähle eine der folgenden:

  • form

  • record

  • field

  • query

Erklärung

Frage 54 von 66

1

Databases also contain metadata.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 55 von 66

1

A key business skill to develop using databases is to use the data from a database to make good objective decisions..

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 56 von 66

1

A database management system (DBMS) is ___.

Wähle eine der folgenden:

  • NOT a collection of software programs to manage data

  • a database system that only gives access to managers

  • a collection of data

  • collects responses from questions

  • a program to create, process, and administer a database

Erklärung

Frage 57 von 66

1

Structured Query Language (SQL) is ___.

Wähle eine der folgenden:

  • a language that relies on mostly read, insert, modify, and delete operations

  • used by most popular relational data base management systems (DBMS)

  • most easily used with a form to structure a DBMS modification

  • an international standard

  • all answers given

Erklärung

Frage 58 von 66

1

An example of a CREATE command for a DBMS would be ___.

Wähle eine der folgenden:

  • an SQL request

  • submitting a web­form to request a replacement driver's license

  • submitting a request to update current personal information in an account

  • submitting a web­form to make a new email account

Erklärung

Frage 59 von 66

1

Content Management Systems (CMS) is an application that sits on top of a DBMS and is often used ___ .

Wähle eine der folgenden:

  • to store personal information in a medical office

  • to create, store, deploy and manage display information for responsive websites

  • for storing warehouse content and structure

  • to manage content for sales execution

Erklärung

Frage 60 von 66

1

One of the big challenges of Big Data is finding a way to __ .

Wähle eine der folgenden:

  • structure a database that can handle it

  • all answers listed

  • visualize it

  • analyze it to give it meaning

Erklärung

Frage 61 von 66

1

Attributes of good website design are _____.

Wähle eine der folgenden:

  • useable, attractive, easy to navigate, with great content

  • nice colors, sellable, useable, good content

  • good spelling and grammar, intuitive navigation, easy­to­remember domain name

  • all answers listed

Erklärung

Frage 62 von 66

1

The World Wide Web and Internet are the same thing.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 63 von 66

1

A ________ is a text document written in HTML.

Wähle eine der folgenden:

  • web page

  • web browser

  • web site

  • web server

Erklärung

Frage 64 von 66

1

An individual's website domain name registration can be accomplished through all but ____________.

Wähle eine der folgenden:

  • a web hosting site

  • a registrar

  • ICANN ­ Internet Corporation for Assigned Names and Numbers

  • BlueHost.com

Erklärung

Frage 65 von 66

1

To use a photo or graphic on your website it must not be owned by someone else.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 66 von 66

1

Creative commons is a good place to look for royalty free photos for a website.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung