Sunday, November 21, 2010

Chapter 12 CC

1.

An information system supports ____ activities of users.

A) daily
B) short-term
C) long-range
D) all of the above

Points Earned:

1.0/1.0


Correct Answer(s):

D

2.

In sequence, most system development cycles contain five phases: ____.

A) planning, analysis, design, implementation, support
B) analysis, implementation, support, design, planning
C) support, design, planning, analysis, implementation
D) implementation, analysis, support, planning, design

Points Earned:

1.0/1.0


Correct Answer(s):

A

3.

A Gantt chart, developed by Henry Gantt, is a ____.

A) diagram that graphically shows how actors interact with an information system
B) tool that graphically shows the flow of data in a system
C) bar chart that uses horizontal bars to show project phases or activities
D) table that lists a variety of conditions and the actions that correspond to them

Points Earned:

1.0/1.0


Correct Answer(s):

C

4.

____ measures whether the lifetime benefits of a proposed system will be greater than its lifetime costs.

A) Operational feasibility
B) Technical feasibility
C) Schedule feasibility
D) Economic feasibility

Points Earned:

1.0/1.0


Correct Answer(s):

D

5.

A(n) ____ diagram used in Object Oriented Analysis and Design, graphically shows how actors interact with an information system.

A) actor
B) software
C) use case
D) EMR

Points Earned:

0.0/1.0


Correct Answer(s):

C

6.

The advantage of custom software is that it ____.

A) matches a company’s requirements exactly
B) is less expensive and takes less time to design and implement than packaged software
C) is mass produced, copyrighted, prewritten, and available for purchase
D) all of the above

Points Earned:

1.0/1.0


Correct Answer(s):

A

7.

The advantage of a prototype is that ____.

A) users always view the prototype as an initial system, which is the result of an extensive analysis
B) users can work with the system before it is completed — to make sure it meets their needs
C) it always has adequate documentation
D) all of the above

Points Earned:

1.0/1.0


Correct Answer(s):

B

8.

The purpose of the ____ is to construct, or build, the new or modified system and then deliver it to the users.

A) planning phase
B) analysis phase
C) implementation phase
D) support phase

Points Earned:

1.0/1.0


Correct Answer(s):

C

9.

An acceptance test ____.

A) verifies that each individual program works by itself
B) verifies that all programs in an application work together properly
C) verifies that an application works with other applications
D) is performed by end-users and verifies that the new system works with actual data

Points Earned:

0.0/1.0


Correct Answer(s):

D

10.

The purpose of the ____ is to provide ongoing assistance for an information system and its users after the system is implemented.

A) analysis phase
B) planning phase
C) operation, support, and security phase
D) design phase

Points Earned:

1.0/1.0


Correct Answer(s):

C

Chapter 11 CC

1.

The term ____ refers to online or Internet-based illegal acts.

A) malicious-logic program
B) computer crime
C) cybercrime
D) system failure

Points Earned:

1.0/1.0


Correct Answer(s):

C

2.

A(n) ____ copies all of the files in a computer.

A) full backup
B) incremental backup
C) differential backup
D) selective backup

Points Earned:

1.0/1.0


Correct Answer(s):

A

3.

Web sites use a ____ to keep track of items in a user’s shopping cart.

A) session cookie
B) zombie
C) adware
D) shopping bot

Points Earned:

1.0/1.0


Correct Answer(s):

A

4.

Many businesses use ____ to limit employees’ Web access.

A) content filtering
B) Web bugs
C) honeypots
D) spyware

Points Earned:

1.0/1.0


Correct Answer(s):

A

5.

Computer forensics is used by ____.

A) military intelligence
B) insurance agencies
C) law enforcement
D) all of the above

Points Earned:

1.0/1.0


Correct Answer(s):

D

6.

The term ____, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.

A) hacker
B) cyberterrorist
C) script kiddie
D) cyberstalker

Points Earned:

1.0/1.0


Correct Answer(s):

A

7.

A computer ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.

A) signature
B) virus
C) definition
D) spim

Points Earned:

1.0/1.0


Correct Answer(s):

B

8.

A virus ____ is a known specific pattern of virus code.

A) index
B) signature
C) glossary
D) master

Points Earned:

1.0/1.0


Correct Answer(s):

B

9.

A(n) ____ agreement is the right to use software.

A) user
B) master
C) authenticating
D) license

Points Earned:

0.0/1.0


Correct Answer(s):

D

10.

One of the more popular e-mail encryption programs is called ____, which is freeware for personal, noncommercial users.

A) IMP
B) TCP
C) DoS
D) PGP

Points Earned:

1.0/1.0


Correct Answer(s):

D

Chapter 10 CC

1.

A database contains files, a file contains ____.

A) characters, a character contains fields, and a field is made up of records
B) fields, a field contains characters, and a character is made up of records
C) records, a record contains characters, and a character is made up of fields
D) records, a record contains fields, and a field is made up of characters

Points Earned:

1.0/1.0


Correct Answer(s):

D

2.

A ____ is the smallest unit of data a computer can process.

A) bit
B) character
C) field
D) record

Points Earned:

1.0/1.0


Correct Answer(s):

A

3.

____ is a common data type that consists of dollar and cent amounts or numbers containing decimal values.

A) AutoNumber
B) Text
C) Currency
D) Object

Points Earned:

1.0/1.0


Correct Answer(s):

C

4.

Generally, users change records in a file ____.

A) when they obtain new data and to correct inaccurate data
B) to correct inaccurate data and to update old data with new data
C) to update old data with new data and when a record no longer is needed
D) when a record no longer is needed and when they obtain new data

Points Earned:

0.0/1.0


Correct Answer(s):

B

5.

A(n) ____ verifies that a required field contains data.

A) range check
B) completeness check
C) consistency check
D) alphabetic/numeric check

Points Earned:

0.0/1.0


Correct Answer(s):

B

6.

A major weakness of a lot of file processing systems is that ____.

A) they have redundant data and they isolate data
B) they are much more complex than a database
C) data is more vulnerable than data in a database
D) all of the above

Points Earned:

0.0/1.0


Correct Answer(s):

A

7.

Popular data models in use today include all of the following except ____.

A) relational
B) hierarchical
C) object-oriented
D) multidimensional

Points Earned:

0.0/1.0


Correct Answer(s):

B

8.

In a relational database, each row ____.

A) and each column has a primary key
B) has a unique name and each column has a primary key
C) has a primary key and each column has a unique name
D) and each column has a unique name

Points Earned:

1.0/1.0


Correct Answer(s):

C

9.

A user of a relational database, refers to a record as a ____.

A) table
B) column
C) row
D) relationship

Points Earned:

0.0/1.0


Correct Answer(s):

C

10.

____, is a query language that allows users to manage, update, and retrieve data.

A) XML
B) DBMS
C) SQL
D) QBE

Points Earned:

1.0/1.0


Correct Answer(s):

C