Information Systems & Computer Applications - Sample Test Flashcards

Terms Definitions
File extensions such as .txt, .bmp, and .mp3 are used to identify a file'sA) outputB) creatorC) sizeD) locationE) format
E) format
Which of the following support tools is NOT provided with most word processing software?A) a spelling checkerB) a thesaurusC) an encyclopediaD) mail-merge capabilityE) a grammar checker
C) an encyclopedia
Which of the following is designed for the purpose of having a team discuss a topic over an extended period of time while keeping the responses organized by topic?A) data libraryB) file sharingC) push technologyD) internet telephonyE) threaded discussion
E) threaded discussion group
Which of the following would NOT be used as an input device for a computer system?A) image scannerB) CD-ROM driveC) keyboardD) mouseE) PC speaker
E) PC speaker
Which of the following is (are) legal for the purchaser of an audio CD?I. Copying the CD for personal use.II. Copying the CD and giving the copy to a friend for free.III. Copying the CD and giving the copy for a friend for a fee.A) noneB) I onlyC) II only
B) I onlyCopying the CD for personal use.
Which of the following capabilities permits the simultaneous usage of multiple CPU's in a single computer system?A) multimediaB) multiplexingC) multiprocessingD) multiprogrammingE) multitasking
C) multiprocessing
One responsibility that is NOT traditionally given to a beginning programmer isA) codingB) debuggingC) program testingD) documentationE) systems design
E) systems design
A spreadsheet contains the values 9 and 12 in cells C4 and D4, respectively. What value will be displayed in cell F4 if F4 contains the formula (C4+D4/3)?A) 7B) 12C) 13D) 15E) 21
C) 13(Note: order of arithmetic operations)
Which of the following is NOT part of input data controls in the context of information processing?A) reasonableness checksB) check digit verificationC) program debuggingD) syntax checksE) batch totals
C) program debugging
Applications software is designed to be compatible with theA) internet browserB) LAN configurationC) operating systemD) programming languageE) hardware interface
C) operating system
Which of the following types of systems development methods would be appropriate when a company does not have an expert IS department?I. outsourcingII. traditional SDLCIII. prototypingA) I onlyB) II onlyC) III onlyD) I and III onlyE) I, II, and III
A) I onlyOutsourcing.
In the case of a power failure, the contents of RAM will beA) automatically printed outB) automatically saved on diskC) displayed on the screenD) lostE) refreshed
D) lost
Which of the following technologies does NOT facilitate knowledge management?A) blogsB) wikisC) web conferencingD) desktop sharingE) biometrics
E) biometrics
Which of the following has as its primary function locating Web sites that deal with particular subjects?A) uniform resource locatorB) search engineC) hypertextD) outsourcerE) browser
B) search engine
Conversion of data files is part of which of the following phases of the information development process?A) analysisB) designC) implementationD) developmentE) maintenance
C) implementation
Which of the following is a database whose data are scattered across several physical servers?A) data mineB) data warehouseC) relational databaseD) distributed databaseE) integrated database
D) distributed database
Each of the following applications is typically available for a personal digital assistant EXCEPTA) statistical analysis softwareB) two-way wireless messagingC) appointment calendarD) address bookE) memo pad
A) statistical analysis software
During preparation of a document using word processing software, a SAVE operation copies the document fromA) a disk to main memoryB) main memory to a printerC) main memory to a diskD) a hard disk to a floppy diskE) one floppy disk to another
C) main memory to a disk
Which of the following best describes how GPS units function?A) The receiver sends out regular query pulses and waits to receive responses from a GPS satellite.B) The receiver is passive and listens for the regular signals from GPS satellites, which are t
B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.
A disaster recovery plan to safeguard a company's computer system can be used for all of the following occurrences EXCEPTA) a flood, fire, or other natural disasterB) a massive long-term power outageC) system upgrades and hardware maintenanceD) computer s
C) system upgrades and hardware maintenance
Using an enterprise resource planning system has which of the following advantages?I. It is easier to install than a typical transaction processing system.II. It provides a centralized database for organizational data.III. It integrates processes over the
D) II and III onlyIt provides a centralized database for organizational data, and it integrates processes over the organization.
In a relational database, each column representsA) a recordB) an attributeC) a keyD) an entityE) a file
B) an attribute
Which of the following is required to access the Internet from a home location?A) Access to an Internet node or service providerB) Access to a LANC) Access to a mainframeD) An e-mail addressE) One's own home page
A) Access to an Internet node or service provider
Assume that a file consists of the following records.Product Number, Product, Model YearBEC111, WIDGET, 2005ABC123, GADGET, 2004SBB003, WIDGET, 2003XPL222, GADGET, 2004MAS120, GADGET, 2000The computer is instructed to sort this file in ascending order wit
D) XPL222, GADGET, 2004
Which of the following is NOT a correct characterization of batch processing?A) It allows immediate updating of master files.B) It provides physical batch totals to be used in control procedures.C) It provides efficient updating of master files.D) It is m
A) It allows immediate updating of master files.
Which of the following pseudocode commands would most likely require a calculation step in an algorithm?A) GETB) SHOWC) PRINTD) SETE) INCREMENT
E) INCREMENT
Which of the following describes a Web site that provides access to multiple services such as news, weather, sports, and stock indexes?A) hostB) portalC) domainD) hyperlinkE) home page
B) portal
Which of the following is the minimum distance range of a class 2 Bluetooth device such as a hands-free cell phone headset?A) 3 feetB) 30 feetC) 300 feetD) 1,000 feetE) 3,000 feet
B) 30 feet
The process of planning, scheduling, and overseeing the development of a new information system is calledA) systems analysisB) software engineeringC) feasibility assessmentsD) project managementE) programming
D) project management
The special formatting language used to create Web pages is calledA) HTMLB) XMLC) PerlD) JavaE) Script
A) HTML
Goals of a supply-chain management system include which of the following?I. Facilitate up-selling of the product.II. Deliver the product to the customer more rapidly.III. Reduce the cost of the product.A) I onlyB) I and II onlyC) I and III onlyD) II and I
D) II and III onlyDeliver the product to the customer more rapidly and reduce the cost of the product.
The process through which a user is verified and validated to access a computer network / system is referred to asA) encryptionB) password protectionC) authenticationD) account validationE) certification
C) authentication
A program written to access and update a master database that maintains sales of tickets to an upcoming concert is calledA) system softwareB) networking softwareC) a transaction processing systemD) an operating systemE) a knowledge management system
C) a transaction processing system
In a spreadsheet formula, what type of cell address is fixed and does not change when the formula is copied?A) relative addressB) constant addressC) fixed addressD) static addressE) absolute address
E) absolute address
Which of the following is the term used when a Web site automatically downloads data or files to a computer whenever new data are available or at scheduled intervals?A) web streamingB) push technologyC) pipeliningD) spammingE) web crawling
B) push technology
Which of the following is (are) true of an object-oriented database in comparison to a relational database?I. The object-oriented database is better for storing multimedia data.II. The object-oriented database generally retrieves data more quickly.III. Th
A) I onlyThe object-oriented database is better for storing multimedia data.
When applied to the development of computer systems, the term "ergonomics" meansA) designing computer systems to maximize the cost-benefit ratioB) incorporating human comfort, efficiency, and safety into the design of the human-machine interfaceC) followi
B) incorporating human comfort, efficiency, and safety into the design of the human-machine interface
Which of the following does NOT provide data security or access security?A) data encryptionB) password protectionC) data encodingD) biometric scanE) digital certificate
C) data encoding
A set of 8 bits can represent, at most, how many different characters?A) 8B) 16C) 64D) 128E) 256
E) 256
Which of the following is NOT a characteristic of a decision support system, as it is usually defined?A) It can be used as an aid in solving ad hoc problems.B) It is useful for what-if analysis.C) It is intended to help managers make decisions.D) It makes
D) It makes the one best or optimal decision.
Meta data is best described as which of the following?A) end-user dataB) data about dataC) data stored in a Web file formatD) data gathered by spywareE) data returned by an Internet search engine
B) data about data
Which of the following is NOT true about computer software documentation?A) End-user documentation may be provided online through access to a help file or subsystem.B) End-user documentation may be provided by means of a hard copy reference manual.C) End-
C) End-user documentation may be embedded in the programming code by use of comment statements.
For which of the following programming languages is there always a one-to-one correspondence between a line of code in that language and a line of code in machine language?A) COBOLB) JavaC) C++D) AssemblerE) Visual BASIC
D) Assembler
An online storefront developer should test the different versions of which of the following in order to ensure usability for all users?A) database management systemsB) hypertext markup languagesC) compilersD) web browsersE) search engines
D) web browsers
For which of the following conditions is it NEVER possible to recover a file from the disk to which it was written?A) A different file with the same name is copied to the same location on the disk.B) The file has been deleted.C) The file becomes fragmente
A) A different file with the same name is copied to the same location on the disk.
The American Charity Association, a nonprofit foundation, has a home page on the World Wide Web. Which of the following is the most likely address for its home page?A) http://www.charity.govB) http://www.chartity.eduC) http://www.charity.comD) http://www.
D) http://www.charity.org
A geographic information system must have which of the following characteristics?I. Every record has an identified geographic location.II. The system uses global positioning satellites.III. The system provides results in a graphic format.A) I onlyB) I and
C) I and III onlyEvery record has an identified geographic location, and the system provides results in a graphic format.
What is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete?A) spoolingB) streamingC) flamingD) spammingE) queuing
B) streaming
Which of the following is a set of protocols used to link different types of computers over the Internet?A) HTMLB) HTTPC) ERPD) TCP/IPE) Ethernet
D) TCP/IP
In considering the economic feasibility of a systems development project, which of the following would a project manager be LEAST likely to consider?A) The cost of developing the system compared with the potential benefits of using the system.B) The retur
E) Whether the hardware can be acquired for the project.
A table called "Students" consists of the following records:Name, Credits, GPAAnderson, 10, 3.0Chen, 9, 3.2Gomez, 12, 3.1Jones, 12, 3.0A user entered the following SQL command:Select Name; From Students; Where Credits > 9 and GPA > 3How many names would b
B) one
Voice recognition can be included with which of the following systems?I. Office automation systemsII. Security systemsIII. Batch-processing systemsA) I onlyB) II onlyC) I and II onlyD) I and III onlyE) I, II, and III
C) I and II onlyOffice automation systems, and Security systems.
Which of the following is a software agent used by some Internet search engines to generate search results?A) web botB) TCP filterC) auto responderD) wormE) indexer
A) web bot
The type of network that would most likely be used to link a corporation's headquarters with it four branch offices located throughout the state is referred to asA) a metropolitan area networkB) a local area networkC) an office area networkD) a wide area
D) a wide area network
Which of the following statements is (are) true concerning multiuser database management systems?I. They increase the standardization of data.II. They increase the need to store data in many different locations in the database.III. They can increase acces
D) I and III onlyThey increase the standardization of data, and they can increase access to and availability of information.
A manager of a small business wants to use a computer to store information about clients, vendors, inventory (item, number, price), and orders. The manager needs to be able to sort and group data for various reports. Which of the following types of softwa
C) database management system
A business often identifies that its software has been trademarked by using a unique symbol or attaching the letters TM to its name. What is the purpose of the trademark?A) To eliminate unauthorized copying and distribution.B) To identify the software as
C) To identify and differentiate the product brand name.
Which of the following is (are) reasons to select a virtual team as opposed to an on-site team?I. It works better when team member have different physical locations.II. It works better when the team is trying to reach consensus.III. It works better when t
A) I onlyIt works better when team member have different physical locations.
Which of the following is true about user passwords?A) They should be changed only by the administrator.B) They must be no more than eight characters in length.C) They are requested by CAPTCHAs.D) They are most secure when they consist of letters, numbers
D) They are most secure when they consist of letters, numbers, and special characters.
The maintenance phase of the system development process could include all of the following activities EXCEPTA) correcting errors in the software that were detected after implementationB) changing the heading on a printed reportC) updating entries in the t
E) performing a complex rewrite for an existing system
Which of the following is a major benefit of object-oriented programming?A) The development of logical steps to achieve the object of the program.B) The use of subroutines that optimize the program's objective.C) The creation of objects that can be used o
C) The creation of objects that can be used or modified for use in future applications.
Which of the following is NOT true of fiber-optic cable when compared with twisted-pair cable?A) Fiber-optic cables have less electrical interference.B) Fiber-optic cables are less susceptible to corrosion.C) Fiber-optic cable connections are easier to in
C) Fiber-optic cable connections are easier to install.
The ability of computerized systems to store and exchange information represents a potential threat to the individuals' right toA) free speechB) privacyC) equal access to informationD) assemblyE) consumer protection
B) privacy
http://www.mywebsite.com:8080/homepage/mine/index.htmlWhich part of the URL above is the domain name?A) httpB) www.mywebsite.comC) 8080D) homepage/mineE) index.html
B) www.mywebsite.com
The required components for a LAN include each of the following EXCEPT aA) networking protocolB) cabling standardC) media-sharing methodD) unique address for each nodeE) print server
E) print server
Which of the following statements concerning real-time processing is generally NOT true?A) A real-time system uses online processing methods.B) A real-time system uses sequential file access.C) A real-time system uses online files.D) A real-time processin
B) A real-time system uses sequential file access.
The CEO of an employment agency is concerned about the imminent retirement of key associates and the resulting impact on the quality of service provided to the agency's customers as newer employees are brought into the firm. Which of the following types o
D) knowledge management system
Data values A and B are stored in spreadsheet cells C1 and D2, respectively. After a cut operation on C1 followed by a paste operation on D2, which of the following will be true?I. Data value B is overwritten.II. Data value A is in cell C1.III. Data value
C) I and III onlyData value B is overwritten, and data value A is in cell D2.
For which of the following consumer applications would there be the LEAST justification to access a national credit history database?A) credit cardB) mortgageC) student loanD) savings accountE) automobile lease
D) savings account
Which of the following statements is true regarding client/server architecture?A) The server computer accepts commands from a number of computers that are its clients.B) The server computer manages a number of computers that it services.C) The server comp
A) The server computer accepts commands from a number of computers that are its clients.
Which of the following is true of C++?A) It is an object-oriented, real-time, general purpose programming language.B) It is a procedural programming language designed primarily for business applications.C) It uses a non-complicated syntax for ease of prog
A) It is an object-oriented, real-time, general purpose programming language.
Which of the following information technology positions would have the highest level of responsibility within a company?A) Chief Information Officer (CIO)B) Project ManagerC) Director of Information TechnologyD) Information Systems ManagerE) Systems Admin
A) Chief Information Officer (CIO)
Which of the following is a protocol whose primary purpose is to route e-mail messages through the Internet?A) TCP/IPB) HTMLC) RISCD) HTTPE) SMTP
E) SMTP
Which of the following is (are) true about customer relationship management systems?I. They focus on the connection between suppliers, manufacturers, and customers.II. They enable employees in all departments to have a consistent view of customers.III. Th
D) II and III onlyThey enable employees in all departments to have a consistent view of customers, and they focus on customer retention.
Which DBMS data model uses two-dimensional tables to display data structures?A) relationalB) hierarchicalC) networkD) navigationalE) CODASYL
A) relational
Which of the following network technologies allows secure transmission of data over an unsecured public network link between private networks?A) local area networkB) wide area networkC) virtual private networkD) intranetE) extranet
C) virtual private network
Which of the following is NOT true of expert systems?A) They are limited in scope to relatively narrow processes.B) They can provide explanations of their reasoning process.C) They can use common sense knowledge.D) They can consider multiple hypothesis si
C) They can use common sense knowledge.
The sharing of a computer's resources by allowing the running of two or more programs concurrently on a computer with a single CPU is calledA) bootingB) pagingC) multitaskingD) multiprocessingE) thrashing
C) multitasking
Which of the following is NOT an advantage of having an entire department using the same office software suite?A) Lower cost per application than if purchased individually.B) Ease of moving data between suite applications.C) Ease of moving data between us
E) Optimal functionality of individual application packages.
Developers quickly develop a version of a system and give it to the users for feedback. The developers then use the users' feedback to revise the system. This process repeats until the users approve the system. This method of developing a system is called
B) prototyping
The following pseudocode depicts the logic in a section of a computer program.SET A TO 1SET B TO 3SET A TO A + BWHILE A SET A TO (A * A)/2END WHILEAfter execution of the program segment, what will be the value of variable A?A) 16B) 20C) 21D) 32E) 64
D) 32
How many 8-bit characters (ASCII) could be placed in the same amount of memory as 300 16-bit characters (Unicode)?A) 150B) 300C) 600D) 32,768E) 76,800
C) 600
A company is planning to automate the importation of data into its mainframe-based system. The data are to be received from several offices, each using PC's. This process will occur on a set schedule without any human intervention at either end. Which of
A) FTP
Which of the following is (are) true of HTML tags?I. Tags are usually used in pairs.II. Tags are visible when Web pages are displayed using browsers.III. Tags are predefined.A) I onlyB) II onlyC) I and III onlyD) II and III onlyE) I, II, and III
C) I and III onlyTags are usually used in pairs, and tags are predefined.
Managers in an organization often use spreadsheets to assist with decision making. The process of using a spreadsheet to try out alternatives is calledA) what-if analysisB) simulationC) flow-chartingD) queryingE) data manipulation
A) what-if analysis
/ 85
Term:
Definition:
Definition:

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})

{[comment.username]}

{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online