1) Which of the following is
considered to be input hardware?
A.
Keyboard
B.
Video Display
C.
Speakers
D.
Plotter
2) The CPU has a small amount
of very fast memory called
A.
the main memory
B.
a data channel
C.
serial bus
D.
a cache
3) A grocery scanning checkout
system is an example of
A.
a vertical-market software
B.
a horizontal market software
C.
a one-of-a-kind application
D.
an operating system
4) Which of the following is
TRUE of in-house custom-developed software?
A.
They are less expensive than
off-the-shelf software.
B.
The organization has to tailor its applications to the software.
C.
They are easy and comparatively
cheap to make.
D.
The developing company pays the
adaptation costs itself.
5) Which of the following is
TRUE of thick-client applications?
A.
A thick-client application is an
application program that need not be preinstalled on the client.
B.
All other things being equal, thin-client applications are preferred
over thick client applications.
C.
A thick client application does not
require preinstallation of client codes.
D.
With a thick-client application, a
system administrator must install the new version on each user computer.
6) The best way to apply a
previously created style to the current document is to
A.
select all paragraphs you want
changed and click on the Style
B.
select each line you want changed
and click on the Style
C.
click on the Style; then select all paragraphs you want changed
D.
click on the Style; then select
each line you want changed
7) If you were writing a
report and wanted the bottom of the third page—after the title page and the
table of contents—to say Page 1, what would you need to insert?
A.
A header
B.
A table
C.
A delimiter
D.
A section break
8) Which of the following
stands true for enterprise DBMS products?
A.
Enterprise DBMS products are
designed for small and simple database applications.
B.
Enterprise DBMS products support many—perhaps thousands—of users and
many different database applications.
C.
Paradox is an example of an
enterprise DBMS product.
D.
Most of the enterprise DBMS
products are out of business today.
9) To locate something in the
database, one must type in the keyword into the ________ of the application.
A.
report
B.
query form
C.
data entry form
D.
data column
10) Which of the following is
true of VPN?
A.
VPN communications are secure even though they are transmitted over
the public Internet.
B.
One disadvantage of VPN is that it
does not encrypt messages.
C.
Remote access is difficult in case
of VPN.
D.
It is a virtual, private pathway
over a public or shared network from the client to the server.
11) Most homes and small
businesses use ________ because they receive more data than they transmit.
A.
SDSL
B.
ISDN
C.
ADSL
D.
PPP
12) A ________ connects
computers at different geographic locations.
A.
LAN
B.
WAN
C.
VPN
D.
PSDN
13) In making a financial plan,
you have decided to assume sales will grow by 10% from this year’s sales. The
information for this year’s sales is contained in cell B5. The correct
formula you should type into a cell to calculate next year’s sales is
A.
=10%*B5
B.
=0.1*B5
C.
=1+B5*0.1
D.
=B5+B5*0.1
14) On a spreadsheet you have
just opened, the projected sales are listed by departments. You have just
summed up the projected sales by each department for year 2009 using a SUMIF
function. To copy the same formulas over to use for year 2010, what types of
referencing should you use?
A.
Use absolute referencing to refer to the column containing
department names, but relative referencing for the rest.
B.
Use relative referencing to refer
to the column containing department names, but relative referencing for the
rest.
C.
Use absolute referencing to refer
to the column containing department names, but mixed referencing for the
rest.
D.
Use relative referencing to refer
to the column containing department names, but mixed referencing for the
rest.
15) You want to model the
growth of the sales of three different products over the past six years. You
want to emphasize the growth of the total amount of sales in addition to the
relative growth rates of each of the products. Which type of chart should you
use?
A.
Clustered column chart
B.
100% stacked column chart
C.
Pie chart
D.
Stacked column chart
16) Which of the following is
true of Web 2.0?
A.
It is a primitive
interorganizational information system.
B.
It is supported by telephones,
faxes, and EDIs.
C.
Its supporting technologies include
HTTP and HTML.
D.
It makes use of user-generated content and is flexible.
17) Nonmerchant companies
A.
take title to the goods they sell
B.
sell services that they provide
C.
include B2C, B2B, and B2G
transactions
D.
arrange for the purchase and sale of goods
18) In the Web 2.0 world, the
value of a site increases
A.
over time
B.
exponentially
C.
as the investments in it increase
D.
with users and use
19) Which of the following
systems for sharing content provides version control?
A.
Microsoft SharePoint
B.
Google Docs
C.
Windows Live SkyDrive
D.
File Transfer Protocol
20) ________ tracks changes to
documents and provides features and functions to accommodate concurrent work.
A.
Version management
B.
Workflow regulation
C.
Workspace management
D.
Content regulation
21) What is the best strategy
for designing a PowerPoint presentation for the first time for your
organization?
A.
Ask around to see if there is a
standard template for the organization.
B.
Choose the template that you used
for the class that you did the best in at college.
C.
Use the Blank Presentation template
just to be safe.
D.
Use the Microsoft.com 5-star rating to find the most well-liked
template.
22) When creating a
presentation, it is most important to consider making the text
A.
readable
B.
decorative
C.
colorful
D.
beautiful
23) Mark recently received an
e-mail from what appeared to be a legitimate company, asking him to update
and verify his credit card details. Unknowingly, he obliged and later
realized that the information had been misused. Mark is a victim of
A.
hacking
B.
phishing
C.
pretexting
D.
sniffing
24) The broadest definition of
________ includes viruses, worms, Trojan horses, spyware, and adware.
A.
malware
B.
metadata
C.
software
D.
widgets
25) Which of the following
statements is true regarding position sensitivity?
A.
It is a type of data safeguard.
B.
It enables security personnel to prioritize their activities in
accordance with the possible risk and loss.
C.
It is documented only for high-sensitivity
positions.
D.
It applies to new employees only.
26) Which of the following is
true regarding an incident-response plan?
A.
The plan should provide
decentralized reporting of all security incidents.
B.
The plan should require minimal
training on the part of employees.
C.
The plan should identify critical personnel and their off-hours
contact information.
D.
The plan should be simple enough to
ensure a fast response with limited practice.
27) Projects that spend so
much time ________ are sometimes said to be in analysis paralysis.
A.
in the system definition phase of
the SDLC
B.
on project scheduling
C.
documenting requirements
D.
designing system components
28) Which of the following
statements is TRUE with regard to system maintenance?
A.
Software developers usually club
enhancement requests and failures together.
B.
IS personnel prioritize system
problems on a first-come-first-served basis.
C.
All commercial software products are shipped with known failures.
D.
All organizations track system
failures and enhancements using word-processing documents.
29) During the ________ phase
of the SDLC process, developers construct, test, and install the components
of the information system.
A.
requirements analysis
B.
database design
C.
feasibility assessment
D.
implementation
30) The easiest and cheapest
time to alter the information system is in the ________ phase of the SDLC.
A.
requirements analysis
B.
system definition
C.
component design
D.
implementation
Order a similar assignment, and have writers from our team of experts write it for you, guaranteeing you an A