Take Another Quiz

Final

35 Questions
Computer Quizzes & Trivia
Questions and Answers
  • 1. 
    1.      is a technique for intercepting computer communications
  • 2. 
    1.      The primary purpose of the requirements analysis phase is to
  • 3. 
    1.      In which of the cases is the strength of competitive forces low?
  • 4. 
    1.      Which of the following is true of social networking problems?
  • 5. 
    1.      According to McAfee’s Enterprise 2.0 model, pushing enterprise content to users based on subscription and alerts is part of _
  • 6. 
    1.      Which of the following activities in the business intelligence process involves creating business intelligence? 
  • 7. 
    1.      Which of the following is considered a personal security safeguard?
  • 8. 
    1.       Information systems are never 
  • 9. 
    1.       The more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? 
  • 10. 
    1.      __ are used to read, insert, modify, and delete data.
  • 11. 
    1.      Which of the following protocols is commonly used by LAN? 
  • 12. 
    1.      Which of the following is an example of a security threat resulting from malicious human activity?
  • 13. 
      A password _ a user.
  • 14. 
    1.      According to McAfee’s Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of __
  • 15. 
    1.       Which of the following is true of business intelligence systems?
  • 16. 
    1.      ___ feasibility concerns whether the new information system fits within a company’s customs, culture, charter, or legal requirements.
  • 17. 
    They seek conformity and want to convince others of the wisdom of their belief. 1.      With respect to the 5 components of SMIS, which of the following is true of application providers?
  • 18. 
    1.       A table is also called a file.
  • 19. 
    1.      When an individual uses the Internet, but not the web, he or she is using___
  • 20. 
    1.       A ___ is used to provide seamless flow of data across networks.
  • 21. 
    The initial step in the first phase of SDLC is to
  • 22. 
    1.      ___ is the application of social media to facilitate the cooperative work of people inside organizations.
  • 23. 
    1.       Which if the following is true of data warehouses?
  • 24. 
    1.      ___ refers to the process of moving the business activity from and old information to a new system.
  • 25. 
    1.       The purpose of a___is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by business intelligence tools.
  • 26. 
    1.      Social media _ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors
  • 27. 
    1.       Which of the following is true of the defenders of belief?
  • 28. 
    Users of smart cards are required to enter a _ to be authenticated
  • 29. 
    1.       Compared to the program development, systems development is 
  • 30. 
    1.        Normal processing procedures for operations personnel are
  • 31. 
    1.       According to Brooks’ Law, adding more people to a late project ___
  • 32. 
    1.      With respect to the five components of SMIS, which of the following is true of SM sponsors? .
  • 33. 
    1.       Organizations should protect sensitive data by storing it in_ form.
  • 34. 
    1.       A ___ is a facility for managing an organization’s business intelligence data.
  • 35. 
    1.      Which of the following operating systems is most commonly used?
Related Topics