CIS 200

Beschreibung

This is a practice exam for the final in CIS200 at Colorado State University
Madalyn Geuke
Quiz von Madalyn Geuke, aktualisiert more than 1 year ago
Madalyn Geuke
Erstellt von Madalyn Geuke vor mehr als 9 Jahre
113
0

Zusammenfassung der Ressource

Frage 1

Frage
When a user clicks on a hyperlink in a web page, they will see a new page. That page was viewable because _____ interpreted the hyper-­text markup language to display it properly.
Antworten
  • The 3 ­tier architecture
  • A web browser
  • A URL
  • A domain name
  • A web server

Frage 2

Frage
The five components of an information system consists of computer hardware, software, data, people, and ________.
Antworten
  • Bugs
  • Device drivers
  • Procedures
  • tools

Frage 3

Frage
A ________ is a text document written in HTML (Hyper-­Text Markup Language).
Antworten
  • web server
  • web browser
  • web page
  • web site

Frage 4

Frage
The "S" in HTTPS stands for _____?
Antworten
  • site
  • segmented
  • secure
  • social

Frage 5

Frage
Which of these is a data communications protocol?
Antworten
  • SOHO (Small office/home office)
  • LAN (Local Area Network)
  • Bluetooth
  • DSL (Digital Subscriber Line)
  • Cable internet connection

Frage 6

Frage
By providing Google Drive, Calendar, and other applications, Google is providing _______.
Antworten
  • Platform as a service (PaaS)
  • Content
  • Software as a service (SaaS)
  • A private cloud
  • Infrastructure as a service (IaaS)

Frage 7

Frage
Which of the answers best defines an Management Information System (MIS)?
Antworten
  • The methods you use to start the program, enter your report print it, and save and back up your file
  • A group of components that interact to achieve some purpose
  • A model of the components of an information system
  • The management and use of information systems that help organizations achieve their strategies

Frage 8

Frage
What is collaboration?
Antworten
  • Similar to cooperation, where people agree upon what needs to be done.
  • A group working together to accomplish a task in less time than if one person were doing the work.
  • An approach to working, which includes people who have similar opinions and compatible personalities.
  • An approach to working in which each member is assigned a task to be worked on individually.
  • A group working together in which all members of the group work together to meet a goal.

Frage 9

Frage
Attributes of good website design are _____.
Antworten
  • all answers given.
  • good spelling and grammer, intuitive navigation, easy­-to­-remember domain name.
  • Useable, attractive, easy to navigate, with great content.
  • nice colors, sellable, useable, good content.

Frage 10

Frage
Metadata is _________.
Antworten
  • information that describes the data
  • hidden data that travels with the digital container of data
  • is available for JPG photos
  • data about data
  • all answers given

Frage 11

Frage
When a company posts a privacy policy, it ensures that the company keeps confidential all the information it collects.
Antworten
  • True
  • False

Frage 12

Frage
Devices running iOS or Mac OS do not get viruses, worms or internet malware.
Antworten
  • True
  • False

Frage 13

Frage
To use a photo on your website, it must NOT be owned by someone else.
Antworten
  • True
  • False

Frage 14

Frage
What is a business process?
Antworten
  • None of the answers
  • The analysis and redesign of workflow within and between enterprises
  • A standardized set of activities that accomplish a specific task, such as processing a customer's order
  • Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations

Frage 15

Frage
A web address such a www.google.com is called __________.
Antworten
  • A URL
  • The server tier
  • A public IP address
  • A domain name

Frage 16

Frage
Which of the following is a definition of information?
Antworten
  • Data
  • Facts
  • Knowledge derived from data
  • Figures
  • Research

Frage 17

Frage
Internet Service Providers (ISP) are responsible for all except __________.
Antworten
  • A gateway to the Internet
  • Security of your messages
  • Providing a legitimate internet address

Frage 18

Frage
Because thin-­client applications run in web browsers, ____.
Antworten
  • The user must have the browser for which the application was developed
  • There will be a different version of the application for each type of browser
  • They are usually obtained via an app store like Apple Store or Google Play.
  • They will have only one version of code developed by a single team of programmers
  • It is impossible to provide any sophisticated processing

Frage 19

Frage
In a company, making the information system more secure will most likely increase the personal freedom of the employees.
Antworten
  • True
  • False

Frage 20

Frage
A set of guidelines that allow different types of devices to communicate with each other is called a ____.
Antworten
  • process
  • language
  • modern
  • protocol

Frage 21

Frage
Net neutrality refers to the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.
Antworten
  • True
  • False

Frage 22

Frage
The photo file formats (file types) are best for website display EXCEPT ______.
Antworten
  • Gif
  • Pst
  • Png
  • Jpeg

Frage 23

Frage
A ________ monitors data flowing over computer network links, such as email, looking for company confidential data.
Antworten
  • sniffer
  • phisher
  • safegaurd
  • hacker

Frage 24

Frage
What is the purpose of a responsive web design?
Antworten
  • It allows one web site to serve different platforms, such as tablets, PCs, and mobile phones.
  • It enables web sites to customize design according to user preferences.
  • It enables web sites to customize content based on user location and preferences.
  • It allows web sites to respond quickly to changing user needs.

Frage 25

Frage
With ___, in addition to using the software for free, a user could also modify the code to create a new version of the software.
Antworten
  • Virtualization
  • Vertical market applications
  • Open Source
  • Horizontal market applications
  • closed source

Frage 26

Frage
The password like "C4t...................." (23 characters) would take longer to crack than "PrXyu.S(bk7$LlVDFP8" (19 characters).
Antworten
  • True
  • False

Frage 27

Frage
The development of _________ must come before the development of ______.
Antworten
  • information; data
  • data; software
  • computer software; information technology
  • information systems; information technology

Frage 28

Frage
Organizations can defend against threats by implementing data, technical, and ___ safeguards.
Antworten
  • Control
  • Infrastructure
  • Key
  • Hacking
  • Human

Frage 29

Frage
Which of the following is not a common example of a wireless device?
Antworten
  • Cellular phone
  • Bluetoooth
  • Ethernet
  • RFID

Frage 30

Frage
The 1 K used when measuring network speed is the same number as the 1K to measuring memory/storage space on a computer.
Antworten
  • True
  • False

Frage 31

Frage
Some cloud vendors offer applications as well as hardware infrastructure, this is known as ________.
Antworten
  • Content delivery network (CDN)
  • Software as a service (SaaS)
  • Service-­oriented architecture (SoA)
  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)

Frage 32

Frage
Data can be represented using light because the computer can understand ____ values.
Antworten
  • 1
  • 8
  • 0 (zero)
  • 2
  • 1024

Frage 33

Frage
Which storage medium is considered volatile?
Antworten
  • Flash drive (Thumb drive)
  • CD-ROM
  • Main memory or RAM
  • DVD

Frage 34

Frage
Theft, terrorist activity, and accidents could all result in ___________.
Antworten
  • Procedural mistakes
  • Advanced persistent threats
  • Loss of infrastructure
  • Incorrect data modification
  • Incorrect data recovery

Frage 35

Frage
Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.
Antworten
  • social engineering
  • phishing
  • sniffing
  • hacking

Frage 36

Frage
In the cloud, the use of hardware components is allocated and reallocated among many different companies; these pooled resources are shared through _____________.
Antworten
  • hosting
  • virtualization
  • interfaces
  • servers
  • economies of scale

Frage 37

Frage
The key characteristics of a LAN are __________.
Antworten
  • It connects computers across multiple geographical areas
  • All of the computers are located on property controlled by the organization that operates the LAN
  • It uses Ethernet
  • A wireless router is required for connecting the devices on the LAN
  • It uses Bluetooth to connect the devices on the LAN

Frage 38

Frage
Which of the following is NOT included in a company­-wide security policy?
Antworten
  • Whether data will be stored with other organizations.
  • What employees can do with their own mobile devices at work.
  • How employees and others can obtain copies of data stored about them.
  • Personnel policies.
  • How employees and others can request changes to inaccurate data.

Frage 39

Frage
Which answer is NOT TRUE for information technology _____
Antworten
  • is the integration of computer with telecommunication equipment for storing, retrieving, manipulating and storage of data.
  • is literally a subset of information systems.
  • the study, design, development, application, implementation, support or management of computer-­based information systems.
  • consists of people, processes, hardware, data, machines and software.

Frage 40

Frage
A device on the Internet is identified by its __________.
Antworten
  • SMTP
  • URL
  • domain name
  • IP address
  • protocol

Frage 41

Frage
Which of the following statements about information systems is true?
Antworten
  • People are easy to manage through information systems.
  • Procedures are stable and don’t change often
  • Hardware failures cannot be managed through design
  • Software is difficult to build.

Frage 42

Frage
Which of the following is an example of a security threat resulting from malicious human activity?
Antworten
  • an employee who accidentally deletes customer records
  • an employee who misunderstands operating procedures
  • an employee who inadvertently installs an old database on top of the current one
  • an employee who intentionally destroys data or other system components

Frage 43

Frage
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Antworten
  • key escrow
  • intrusion detection system
  • account administration system
  • malware definition

Frage 44

Frage
As a general rule, native applications ____.
Antworten
  • Are easy to develop
  • Are similar to thin­-client applications
  • Are developed as web pages
  • Easily adapt to any operating system
  • Are expensive to develop

Frage 45

Frage
___% of the web is visible to a Google, Bing or Yahoo search.
Antworten
  • 50
  • 95
  • 35
  • 5

Frage 46

Frage
The World Wide Web and Internet are the same thing.
Antworten
  • True
  • False

Frage 47

Frage
If an organization uses cloud services that provide hardware, an operating system, and a Data Base Management System (DBMS), but has to provide their own applications, they are using _____.
Antworten
  • Hardware as a service (HaaS)
  • Platform as a service (PaaS)
  • A private cloud
  • Software as a service (SaaS)
  • Infrastructure as a service (IaaS)

Frage 48

Frage
"URL" stands for ____?
Antworten
  • Ultra Reliable Linkage
  • Unique Real Link
  • Uniform Resource Locator
  • User Responsibility Liability

Frage 49

Frage
IoT stands for
Antworten
  • Input­-Output Technology
  • Internet of Things
  • I am On Target
  • Input-­Output Testing

Frage 50

Frage
The rest of the web that Google, Bing, or Yahoo does not search is called ___________.
Antworten
  • The mystery web
  • The illegal web
  • The dark web
  • It doesn't have a name because there is no part of the web Google, Bing, and Yahoo do not search.
  • The other web

Frage 51

Frage
_____ are the basic building blocks of a relational database.
Antworten
  • reports
  • queries
  • tables
  • forms

Frage 52

Frage
Each row in a table contains all the data for a single ___.
Antworten
  • query
  • record
  • form
  • field

Frage 53

Frage
Each column in a table represents a single value called a ___.
Antworten
  • form
  • record
  • field
  • query

Frage 54

Frage
Databases also contain metadata.
Antworten
  • True
  • False

Frage 55

Frage
A key business skill to develop using databases is to use the data from a database to make good objective decisions..
Antworten
  • True
  • False

Frage 56

Frage
A database management system (DBMS) is ___.
Antworten
  • NOT a collection of software programs to manage data
  • a database system that only gives access to managers
  • a collection of data
  • collects responses from questions
  • a program to create, process, and administer a database

Frage 57

Frage
Structured Query Language (SQL) is ___.
Antworten
  • a language that relies on mostly read, insert, modify, and delete operations
  • used by most popular relational data base management systems (DBMS)
  • most easily used with a form to structure a DBMS modification
  • an international standard
  • all answers given

Frage 58

Frage
An example of a CREATE command for a DBMS would be ___.
Antworten
  • an SQL request
  • submitting a web­form to request a replacement driver's license
  • submitting a request to update current personal information in an account
  • submitting a web­form to make a new email account

Frage 59

Frage
Content Management Systems (CMS) is an application that sits on top of a DBMS and is often used ___ .
Antworten
  • to store personal information in a medical office
  • to create, store, deploy and manage display information for responsive websites
  • for storing warehouse content and structure
  • to manage content for sales execution

Frage 60

Frage
One of the big challenges of Big Data is finding a way to __ .
Antworten
  • structure a database that can handle it
  • all answers listed
  • visualize it
  • analyze it to give it meaning

Frage 61

Frage
Attributes of good website design are _____.
Antworten
  • useable, attractive, easy to navigate, with great content
  • nice colors, sellable, useable, good content
  • good spelling and grammar, intuitive navigation, easy­to­remember domain name
  • all answers listed

Frage 62

Frage
The World Wide Web and Internet are the same thing.
Antworten
  • True
  • False

Frage 63

Frage
A ________ is a text document written in HTML.
Antworten
  • web page
  • web browser
  • web site
  • web server

Frage 64

Frage
An individual's website domain name registration can be accomplished through all but ____________.
Antworten
  • a web hosting site
  • a registrar
  • ICANN ­ Internet Corporation for Assigned Names and Numbers
  • BlueHost.com

Frage 65

Frage
To use a photo or graphic on your website it must not be owned by someone else.
Antworten
  • True
  • False

Frage 66

Frage
Creative commons is a good place to look for royalty free photos for a website.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

FIT3031 - Network Security Exam Practice
Nicholas Bagnall
Managing Information Systems
Clair Hat
Organizing Knowledge
natalie.piernak
Prefixe
biologa.dri
Protocols and Communication
Ryan Baldwin
Multiple Choice type questions
Kingsley Enyiorj
MIS quiz
Ben Swift
Key terms 2
k_gray99
Network
nooneknow2050
Internet
nooneknow2050