CIS 200

Question 1 of 66

Medal-premium 1

When a user clicks on a hyperlink in a web page, they will see a new page. That page was viewable because _____ interpreted the hyper-­text markup language to display it properly.

Select one of the following:

  • The 3 ­tier architecture

  • A web browser

  • A URL

  • A domain name

  • A web server

Question 2 of 66

Medal-premium 1

The five components of an information system consists of computer hardware, software, data, people, and ________.

Select one of the following:

  • Bugs

  • Device drivers

  • Procedures

  • tools

Question 3 of 66

Medal-premium 1

A ________ is a text document written in HTML (Hyper-­Text Markup Language).

Select one of the following:

  • web server

  • web browser

  • web page

  • web site

Question 4 of 66

Medal-premium 1

The "S" in HTTPS stands for _____?

Select one of the following:

  • site

  • segmented

  • secure

  • social

Question 5 of 66

Medal-premium 1

Which of these is a data communications protocol?

Select one of the following:

  • SOHO (Small office/home office)

  • LAN (Local Area Network)

  • Bluetooth

  • DSL (Digital Subscriber Line)

  • Cable internet connection

Question 6 of 66

Medal-premium 1

By providing Google Drive, Calendar, and other applications, Google is providing _______.

Select one of the following:

  • Platform as a service (PaaS)

  • Content

  • Software as a service (SaaS)

  • A private cloud

  • Infrastructure as a service (IaaS)

Question 7 of 66

Medal-premium 1

Which of the answers best defines an Management Information System (MIS)?

Select one of the following:

  • The methods you use to start the program, enter your report print it, and save and back up your file

  • A group of components that interact to achieve some purpose

  • A model of the components of an information system

  • The management and use of information systems that help organizations achieve their strategies

Question 8 of 66

Medal-premium 1

What is collaboration?

Select one of the following:

  • Similar to cooperation, where people agree upon what needs to be done.

  • A group working together to accomplish a task in less time than if one person were doing the work.

  • An approach to working, which includes people who have similar opinions and compatible personalities.

  • An approach to working in which each member is assigned a task to be worked on individually.

  • A group working together in which all members of the group work together to meet a goal.

Question 9 of 66

Medal-premium 1

Attributes of good website design are _____.

Select one of the following:

  • all answers given.

  • good spelling and grammer, intuitive navigation, easy­-to­-remember domain name.

  • Useable, attractive, easy to navigate, with great content.

  • nice colors, sellable, useable, good content.

Question 10 of 66

Medal-premium 1

Metadata is _________.

Select one of the following:

  • information that describes the data

  • hidden data that travels with the digital container of data

  • is available for JPG photos

  • data about data

  • all answers given

Question 11 of 66

Medal-premium 1

When a company posts a privacy policy, it ensures that the company keeps confidential all the information it collects.

Select one of the following:

  • True
  • False

Question 12 of 66

Medal-premium 1

Devices running iOS or Mac OS do not get viruses, worms or internet malware.

Select one of the following:

  • True
  • False

Question 13 of 66

Medal-premium 1

To use a photo on your website, it must NOT be owned by someone else.

Select one of the following:

  • True
  • False

Question 14 of 66

Medal-premium 1

What is a business process?

Select one of the following:

  • None of the answers

  • The analysis and redesign of workflow within and between enterprises

  • A standardized set of activities that accomplish a specific task, such as processing a customer's order

  • Integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations

Question 15 of 66

Medal-premium 1

A web address such a www.google.com is called __________.

Select one of the following:

  • A URL

  • The server tier

  • A public IP address

  • A domain name

Question 16 of 66

Medal-premium 1

Which of the following is a definition of information?

Select one of the following:

  • Data

  • Facts

  • Knowledge derived from data

  • Figures

  • Research

Question 17 of 66

Medal-premium 1

Internet Service Providers (ISP) are responsible for all except __________.

Select one of the following:

  • A gateway to the Internet

  • Security of your messages

  • Providing a legitimate internet address

Question 18 of 66

Medal-premium 1

Because thin-­client applications run in web browsers, ____.

Select one of the following:

  • The user must have the browser for which the application was developed

  • There will be a different version of the application for each type of browser

  • They are usually obtained via an app store like Apple Store or Google Play.

  • They will have only one version of code developed by a single team of programmers

  • It is impossible to provide any sophisticated processing

Question 19 of 66

Medal-premium 1

In a company, making the information system more secure will most likely increase the personal freedom of the employees.

Select one of the following:

  • True
  • False

Question 20 of 66

Medal-premium 1

A set of guidelines that allow different types of devices to communicate with each other is called a ____.

Select one of the following:

  • process

  • language

  • modern

  • protocol

Question 21 of 66

Medal-premium 1

Net neutrality refers to the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites.

Select one of the following:

  • True
  • False

Question 22 of 66

Medal-premium 1

The photo file formats (file types) are best for website display EXCEPT ______.

Select one of the following:

  • Gif

  • Pst

  • Png

  • Jpeg

Question 23 of 66

Medal-premium 1

A ________ monitors data flowing over computer network links, such as email, looking for company confidential data.

Select one of the following:

  • sniffer

  • phisher

  • safegaurd

  • hacker

Question 24 of 66

Medal-premium 1

What is the purpose of a responsive web design?

Select one of the following:

  • It allows one web site to serve different platforms, such as tablets, PCs, and mobile phones.

  • It enables web sites to customize design according to user preferences.

  • It enables web sites to customize content based on user location and preferences.

  • It allows web sites to respond quickly to changing user needs.

Question 25 of 66

Medal-premium 1

With ___, in addition to using the software for free, a user could also modify the code to create a new version of the software.

Select one of the following:

  • Virtualization

  • Vertical market applications

  • Open Source

  • Horizontal market applications

  • closed source

Question 26 of 66

Medal-premium 1

The password like "C4t...................." (23 characters) would take longer to crack than "PrXyu.S(bk7$LlVDFP8" (19 characters).

Select one of the following:

  • True
  • False

Question 27 of 66

Medal-premium 1

The development of _________ must come before the development of ______.

Select one of the following:

  • information; data

  • data; software

  • computer software; information technology

  • information systems; information technology

Question 28 of 66

Medal-premium 1

Organizations can defend against threats by implementing data, technical, and ___ safeguards.

Select one of the following:

  • Control

  • Infrastructure

  • Key

  • Hacking

  • Human

Question 29 of 66

Medal-premium 1

Which of the following is not a common example of a wireless device?

Select one of the following:

  • Cellular phone

  • Bluetoooth

  • Ethernet

  • RFID

Question 30 of 66

Medal-premium 1

The 1 K used when measuring network speed is the same number as the 1K to measuring memory/storage space on a computer.

Select one of the following:

  • True
  • False

Question 31 of 66

Medal-premium 1

Some cloud vendors offer applications as well as hardware infrastructure, this is known as ________.

Select one of the following:

  • Content delivery network (CDN)

  • Software as a service (SaaS)

  • Service-­oriented architecture (SoA)

  • Infrastructure as a service (IaaS)

  • Platform as a service (PaaS)

Question 32 of 66

Medal-premium 1

Data can be represented using light because the computer can understand ____ values.

Select one of the following:

  • 1

  • 8

  • 0 (zero)

  • 2

  • 1024

Question 33 of 66

Medal-premium 1

Which storage medium is considered volatile?

Select one of the following:

  • Flash drive (Thumb drive)

  • CD-ROM

  • Main memory or RAM

  • DVD

Question 34 of 66

Medal-premium 1

Theft, terrorist activity, and accidents could all result in ___________.

Select one of the following:

  • Procedural mistakes

  • Advanced persistent threats

  • Loss of infrastructure

  • Incorrect data modification

  • Incorrect data recovery

Question 35 of 66

Medal-premium 1

Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________.

Select one of the following:

  • social engineering

  • phishing

  • sniffing

  • hacking

Question 36 of 66

Medal-premium 1

In the cloud, the use of hardware components is allocated and reallocated among many different companies; these pooled resources are shared through _____________.

Select one of the following:

  • hosting

  • virtualization

  • interfaces

  • servers

  • economies of scale

Question 37 of 66

Medal-premium 1

The key characteristics of a LAN are __________.

Select one of the following:

  • It connects computers across multiple geographical areas

  • All of the computers are located on property controlled by the organization that operates the LAN

  • It uses Ethernet

  • A wireless router is required for connecting the devices on the LAN

  • It uses Bluetooth to connect the devices on the LAN

Question 38 of 66

Medal-premium 1

Which of the following is NOT included in a company­-wide security policy?

Select one of the following:

  • Whether data will be stored with other organizations.

  • What employees can do with their own mobile devices at work.

  • How employees and others can obtain copies of data stored about them.

  • Personnel policies.

  • How employees and others can request changes to inaccurate data.

Question 39 of 66

Medal-premium 1

Which answer is NOT TRUE for information technology _____

Select one of the following:

  • is the integration of computer with telecommunication equipment for storing, retrieving, manipulating and storage of data.

  • is literally a subset of information systems.

  • the study, design, development, application, implementation, support or management of computer-­based information systems.

  • consists of people, processes, hardware, data, machines and software.

Question 40 of 66

Medal-premium 1

A device on the Internet is identified by its __________.

Select one of the following:

  • SMTP

  • URL

  • domain name

  • IP address

  • protocol

Question 41 of 66

Medal-premium 1

Which of the following statements about information systems is true?

Select one of the following:

  • People are easy to manage through information systems.

  • Procedures are stable and don’t change often

  • Hardware failures cannot be managed through design

  • Software is difficult to build.

Question 42 of 66

Medal-premium 1

Which of the following is an example of a security threat resulting from malicious human activity?

Select one of the following:

  • an employee who accidentally deletes customer records

  • an employee who misunderstands operating procedures

  • an employee who inadvertently installs an old database on top of the current one

  • an employee who intentionally destroys data or other system components

Question 43 of 66

Medal-premium 1

A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

Select one of the following:

  • key escrow

  • intrusion detection system

  • account administration system

  • malware definition

Question 44 of 66

Medal-premium 1

As a general rule, native applications ____.

Select one of the following:

  • Are easy to develop

  • Are similar to thin­-client applications

  • Are developed as web pages

  • Easily adapt to any operating system

  • Are expensive to develop

Question 45 of 66

Medal-premium 1

___% of the web is visible to a Google, Bing or Yahoo search.

Select one of the following:

  • 50

  • 95

  • 35

  • 5

Question 46 of 66

Medal-premium 1

The World Wide Web and Internet are the same thing.

Select one of the following:

  • True
  • False

Question 47 of 66

Medal-premium 1

If an organization uses cloud services that provide hardware, an operating system, and a Data Base Management
System (DBMS), but has to provide their own applications, they are using _____.

Select one of the following:

  • Hardware as a service (HaaS)

  • Platform as a service (PaaS)

  • A private cloud

  • Software as a service (SaaS)

  • Infrastructure as a service (IaaS)

Question 48 of 66

Medal-premium 1

"URL" stands for ____?

Select one of the following:

  • Ultra Reliable Linkage

  • Unique Real Link

  • Uniform Resource Locator

  • User Responsibility Liability

Question 49 of 66

Medal-premium 1

IoT stands for

Select one of the following:

  • Input­-Output Technology

  • Internet of Things

  • I am On Target

  • Input-­Output Testing

Question 50 of 66

Medal-premium 1

The rest of the web that Google, Bing, or Yahoo does not search is called ___________.

Select one of the following:

  • The mystery web

  • The illegal web

  • The dark web

  • It doesn't have a name because there is no part of the web Google, Bing, and Yahoo do not search.

  • The other web

Question 51 of 66

Medal-premium 1

_____ are the basic building blocks of a relational database.

Select one of the following:

  • reports

  • queries

  • tables

  • forms

Question 52 of 66

Medal-premium 1

Each row in a table contains all the data for a single ___.

Select one of the following:

  • query

  • record

  • form

  • field

Question 53 of 66

Medal-premium 1

Each column in a table represents a single value called a ___.

Select one of the following:

  • form

  • record

  • field

  • query

Question 54 of 66

Medal-premium 1

Databases also contain metadata.

Select one of the following:

  • True
  • False

Question 55 of 66

Medal-premium 1

A key business skill to develop using databases is to use the data from a database to make good objective decisions..

Select one of the following:

  • True
  • False

Question 56 of 66

Medal-premium 1

A database management system (DBMS) is ___.

Select one of the following:

  • NOT a collection of software programs to manage data

  • a database system that only gives access to managers

  • a collection of data

  • collects responses from questions

  • a program to create, process, and administer a database

Question 57 of 66

Medal-premium 1

Structured Query Language (SQL) is ___.

Select one of the following:

  • a language that relies on mostly read, insert, modify, and delete operations

  • used by most popular relational data base management systems (DBMS)

  • most easily used with a form to structure a DBMS modification

  • an international standard

  • all answers given

Question 58 of 66

Medal-premium 1

An example of a CREATE command for a DBMS would be ___.

Select one of the following:

  • an SQL request

  • submitting a web­form to request a replacement driver's license

  • submitting a request to update current personal information in an account

  • submitting a web­form to make a new email account

Question 59 of 66

Medal-premium 1

Content Management Systems (CMS) is an application that sits on top of a DBMS and is often used ___ .

Select one of the following:

  • to store personal information in a medical office

  • to create, store, deploy and manage display information for responsive websites

  • for storing warehouse content and structure

  • to manage content for sales execution

Question 60 of 66

Medal-premium 1

One of the big challenges of Big Data is finding a way to __ .

Select one of the following:

  • structure a database that can handle it

  • all answers listed

  • visualize it

  • analyze it to give it meaning

Question 61 of 66

Medal-premium 1

Attributes of good website design are _____.

Select one of the following:

  • useable, attractive, easy to navigate, with great content

  • nice colors, sellable, useable, good content

  • good spelling and grammar, intuitive navigation, easy­to­remember domain name

  • all answers listed

Question 62 of 66

Medal-premium 1

The World Wide Web and Internet are the same thing.

Select one of the following:

  • True
  • False

Question 63 of 66

Medal-premium 1

A ________ is a text document written in HTML.

Select one of the following:

  • web page

  • web browser

  • web site

  • web server

Question 64 of 66

Medal-premium 1

An individual's website domain name registration can be accomplished through all but ____________.

Select one of the following:

  • a web hosting site

  • a registrar

  • ICANN ­ Internet Corporation for Assigned Names and Numbers

  • BlueHost.com

Question 65 of 66

Medal-premium 1

To use a photo or graphic on your website it must not be owned by someone else.

Select one of the following:

  • True
  • False

Question 66 of 66

Medal-premium 1

Creative commons is a good place to look for royalty free photos for a website.

Select one of the following:

  • True
  • False
Icon_fullscreen
Madalyn Geuke
Quiz by , created over 1 year ago

This is a practice exam for the final in CIS200 at Colorado State University

Eye 39
Pin 0
Balloon-left 0
Tags
Madalyn Geuke
Created by Madalyn Geuke over 1 year ago
Close