We have sent an email with your new password.

Close this window

Final

35 Questions  I  By [email protected]
Computer Quizzes & Trivia

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  1.      is a technique for intercepting computer communications
2.  1.      The primary purpose of the requirements analysis phase is to
3.  1.      In which of the cases is the strength of competitive forces low?
4.  1.      Which of the following is true of social networking problems?
5.  1.      According to McAfee’s Enterprise 2.0 model, pushing enterprise content to users based on subscription and alerts is part of _
6.  1.      Which of the following activities in the business intelligence process involves creating business intelligence? 
7.  1.      Which of the following is considered a personal security safeguard?
8.  1.       Information systems are never 
9.  1.       The more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? 
10.  1.      __ are used to read, insert, modify, and delete data.
11.  1.      Which of the following protocols is commonly used by LAN? 
12.  1.      Which of the following is an example of a security threat resulting from malicious human activity?
13.    A password _ a user.
14.  1.      According to McAfee’s Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of __
15.  1.       Which of the following is true of business intelligence systems?
16.  1.      ___ feasibility concerns whether the new information system fits within a company’s customs, culture, charter, or legal requirements.
17.  They seek conformity and want to convince others of the wisdom of their belief. 1.      With respect to the 5 components of SMIS, which of the following is true of application providers?
18.  1.       A table is also called a file.
19.  1.      When an individual uses the Internet, but not the web, he or she is using___
20.  1.       A ___ is used to provide seamless flow of data across networks.
21.  The initial step in the first phase of SDLC is to
22.  1.      ___ is the application of social media to facilitate the cooperative work of people inside organizations.
23.  1.       Which if the following is true of data warehouses?
24.  1.      ___ refers to the process of moving the business activity from and old information to a new system.
25.  1.       The purpose of a___is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by business intelligence tools.
26.  1.      Social media _ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors
27.  1.       Which of the following is true of the defenders of belief?
28.  Users of smart cards are required to enter a _ to be authenticated
29.  1.       Compared to the program development, systems development is 
30.  1.        Normal processing procedures for operations personnel are
31.  1.       According to Brooks’ Law, adding more people to a late project ___
32.  1.      With respect to the five components of SMIS, which of the following is true of SM sponsors? .
33.  1.       Organizations should protect sensitive data by storing it in_ form.
34.  1.       A ___ is a facility for managing an organization’s business intelligence data.
35.  1.      Which of the following operating systems is most commonly used?
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz