When a user clicks on a hyperlink in a web page, they will see a new page. That page was viewable because _____ interpreted the hyper-text markup language to display it properly.
The 3 tier architecture
A web browser
A URL
A domain name
A web server
The five components of an information system consists of computer hardware, software, data, people, and ________.
Bugs
Device drivers
Procedures
tools
A ________ is a text document written in HTML (Hyper-Text Markup Language).
web server
web browser
web page
web site
The "S" in HTTPS stands for _____?
site
segmented
secure
social
Which of these is a data communications protocol?
SOHO (Small office/home office)
LAN (Local Area Network)
Bluetooth
DSL (Digital Subscriber Line)
Cable internet connection
By providing Google Drive, Calendar, and other applications, Google is providing _______.
Platform as a service (PaaS)
Content
Software as a service (SaaS)
A private cloud
Infrastructure as a service (IaaS)
Which of the answers best defines an Management Information System (MIS)?
The methods you use to start the program, enter your report print it, and save and back up your file
A group of components that interact to achieve some purpose
A model of the components of an information system
The management and use of information systems that help organizations achieve their strategies
What is collaboration?
Similar to cooperation, where people agree upon what needs to be done.
A group working together to accomplish a task in less time than if one person were doing the work.
An approach to working, which includes people who have similar opinions and compatible personalities.
An approach to working in which each member is assigned a task to be worked on individually.
A group working together in which all members of the group work together to meet a goal.
Attributes of good website design are _____.
all answers given.
good spelling and grammer, intuitive navigation, easy-to-remember domain name.
Useable, attractive, easy to navigate, with great content.
nice colors, sellable, useable, good content.
Metadata is _________.
information that describes the data
hidden data that travels with the digital container of data
is available for JPG photos
data about data
all answers given
When a company posts a privacy policy, it ensures that the company keeps confidential all the information it collects.
Devices running iOS or Mac OS do not get viruses, worms or internet malware.
To use a photo on your website, it must NOT be owned by someone else.
What is a business process?
None of the answers
The analysis and redesign of workflow within and between enterprises
A standardized set of activities that accomplish a specific task, such as processing a customer's order
Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations
A web address such a www.google.com is called __________.
The server tier
A public IP address
Which of the following is a definition of information?
Data
Facts
Knowledge derived from data
Figures
Research
Internet Service Providers (ISP) are responsible for all except __________.
A gateway to the Internet
Security of your messages
Providing a legitimate internet address
Because thin-client applications run in web browsers, ____.
The user must have the browser for which the application was developed
There will be a different version of the application for each type of browser
They are usually obtained via an app store like Apple Store or Google Play.
They will have only one version of code developed by a single team of programmers
It is impossible to provide any sophisticated processing
In a company, making the information system more secure will most likely increase the personal freedom of the employees.
A set of guidelines that allow different types of devices to communicate with each other is called a ____.
process
language
modern
protocol
Net neutrality refers to the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.
The photo file formats (file types) are best for website display EXCEPT ______.
Gif
Pst
Png
Jpeg
A ________ monitors data flowing over computer network links, such as email, looking for company confidential data.
sniffer
phisher
safegaurd
hacker
What is the purpose of a responsive web design?
It allows one web site to serve different platforms, such as tablets, PCs, and mobile phones.
It enables web sites to customize design according to user preferences.
It enables web sites to customize content based on user location and preferences.
It allows web sites to respond quickly to changing user needs.
With ___, in addition to using the software for free, a user could also modify the code to create a new version of the software.
Virtualization
Vertical market applications
Open Source
Horizontal market applications
closed source
The password like "C4t...................." (23 characters) would take longer to crack than "PrXyu.S(bk7$LlVDFP8" (19 characters).
The development of _________ must come before the development of ______.
information; data
data; software
computer software; information technology
information systems; information technology
Organizations can defend against threats by implementing data, technical, and ___ safeguards.
Control
Infrastructure
Key
Hacking
Human
Which of the following is not a common example of a wireless device?
Cellular phone
Bluetoooth
Ethernet
RFID
The 1 K used when measuring network speed is the same number as the 1K to measuring memory/storage space on a computer.
Some cloud vendors offer applications as well as hardware infrastructure, this is known as ________.
Content delivery network (CDN)
Service-oriented architecture (SoA)
Data can be represented using light because the computer can understand ____ values.
1
8
0 (zero)
2
1024
Which storage medium is considered volatile?
Flash drive (Thumb drive)
CD-ROM
Main memory or RAM
DVD
Theft, terrorist activity, and accidents could all result in ___________.
Procedural mistakes
Advanced persistent threats
Loss of infrastructure
Incorrect data modification
Incorrect data recovery
Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.
social engineering
phishing
sniffing
hacking
In the cloud, the use of hardware components is allocated and reallocated among many different companies; these pooled resources are shared through _____________.
hosting
virtualization
interfaces
servers
economies of scale
The key characteristics of a LAN are __________.
It connects computers across multiple geographical areas
All of the computers are located on property controlled by the organization that operates the LAN
It uses Ethernet
A wireless router is required for connecting the devices on the LAN
It uses Bluetooth to connect the devices on the LAN
Which of the following is NOT included in a company-wide security policy?
Whether data will be stored with other organizations.
What employees can do with their own mobile devices at work.
How employees and others can obtain copies of data stored about them.
Personnel policies.
How employees and others can request changes to inaccurate data.
Which answer is NOT TRUE for information technology _____
is the integration of computer with telecommunication equipment for storing, retrieving, manipulating and storage of data.
is literally a subset of information systems.
the study, design, development, application, implementation, support or management of computer-based information systems.
consists of people, processes, hardware, data, machines and software.
A device on the Internet is identified by its __________.
SMTP
URL
domain name
IP address
Which of the following statements about information systems is true?
People are easy to manage through information systems.
Procedures are stable and don’t change often
Hardware failures cannot be managed through design
Software is difficult to build.
Which of the following is an example of a security threat resulting from malicious human activity?
an employee who accidentally deletes customer records
an employee who misunderstands operating procedures
an employee who inadvertently installs an old database on top of the current one
an employee who intentionally destroys data or other system components
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
key escrow
intrusion detection system
account administration system
malware definition
As a general rule, native applications ____.
Are easy to develop
Are similar to thin-client applications
Are developed as web pages
Easily adapt to any operating system
Are expensive to develop
___% of the web is visible to a Google, Bing or Yahoo search.
50
95
35
5
The World Wide Web and Internet are the same thing.
If an organization uses cloud services that provide hardware, an operating system, and a Data Base Management System (DBMS), but has to provide their own applications, they are using _____.
Hardware as a service (HaaS)
"URL" stands for ____?
Ultra Reliable Linkage
Unique Real Link
Uniform Resource Locator
User Responsibility Liability
IoT stands for
Input-Output Technology
Internet of Things
I am On Target
Input-Output Testing
The rest of the web that Google, Bing, or Yahoo does not search is called ___________.
The mystery web
The illegal web
The dark web
It doesn't have a name because there is no part of the web Google, Bing, and Yahoo do not search.
The other web
_____ are the basic building blocks of a relational database.
reports
queries
tables
forms
Each row in a table contains all the data for a single ___.
query
record
form
field
Each column in a table represents a single value called a ___.
Databases also contain metadata.
A key business skill to develop using databases is to use the data from a database to make good objective decisions..
A database management system (DBMS) is ___.
NOT a collection of software programs to manage data
a database system that only gives access to managers
a collection of data
collects responses from questions
a program to create, process, and administer a database
Structured Query Language (SQL) is ___.
a language that relies on mostly read, insert, modify, and delete operations
used by most popular relational data base management systems (DBMS)
most easily used with a form to structure a DBMS modification
an international standard
An example of a CREATE command for a DBMS would be ___.
an SQL request
submitting a webform to request a replacement driver's license
submitting a request to update current personal information in an account
submitting a webform to make a new email account
Content Management Systems (CMS) is an application that sits on top of a DBMS and is often used ___ .
to store personal information in a medical office
to create, store, deploy and manage display information for responsive websites
for storing warehouse content and structure
to manage content for sales execution
One of the big challenges of Big Data is finding a way to __ .
structure a database that can handle it
all answers listed
visualize it
analyze it to give it meaning
useable, attractive, easy to navigate, with great content
nice colors, sellable, useable, good content
good spelling and grammar, intuitive navigation, easytoremember domain name
A ________ is a text document written in HTML.
An individual's website domain name registration can be accomplished through all but ____________.
a web hosting site
a registrar
ICANN Internet Corporation for Assigned Names and Numbers
BlueHost.com
To use a photo or graphic on your website it must not be owned by someone else.
Creative commons is a good place to look for royalty free photos for a website.