Related Topics
Take Another Quiz

CIS Exam 2

36 Questions
Professional Certification Quizzes & Trivia
Questions and Answers
  • 1. 
    Computers that reside in different geographic locations are connected using a(n) ________.
    • A. 

      WAN

    • B. 

      XML

    • C. 

      URL

    • D. 

      LAN

  • 2. 
    ________ transmission is good for homes and small businesses because they receive more data than they transmit.
    • A. 

      ADSL

    • B. 

      DSL

    • C. 

      SDSL

    • D. 

      UTP

  • 3. 
    Which of the following statements is true about the IEEE 802.11 protocol?
    • A. 

      It is used for wired LAN connections.

    • B. 

      It cannot be processed by access points.

    • C. 

      It can be used by WNICs.

    • D. 

      It is also known as Ethernet.

  • 4. 
    A(n) ________ contains the URL of the Web page to find when the user clicks it.
    • A. 

      Attribute

    • B. 

      Hyperlink

    • C. 

      IP address

    • D. 

      Domain

  • 5. 
    Which of the following is true about virtual private networks?
    • A. 

      As they are transmitted over the public Internet, VPN transmissions are not secure

    • B. 

      They create public, point-to-point connections between users.

    • C. 

      VPNs do not allow remote access for users.

    • D. 

      VPN software encrypts messages to ensure secure transmissions.

  • 6. 
    Broadband communications have transmission speeds in excess of ________.
    • A. 

      1024 kbps

    • B. 

      256 kbps

    • C. 

      512 kbps

    • D. 

      1.2 Mbps

  • 7. 
    ________ is a wireless protocol used to communicate over short distances.
    • A. 

      Bluetooth

    • B. 

      Firewire

    • C. 

      Ethernet

    • D. 

      IEEE 802.3

  • 8. 
    In which of the following cases is a user using the Internet, but not the Web?
    • A. 

      While sending a file using the FTP

    • B. 

      While using a browser such as Safari or Google Chrome

    • C. 

      While sending sensitive data like credit card numbers using HTTPS

    • D. 

      While emailing or text messaging using HTTP

  • 9. 
    For a printer or laptop to connect to a wireless LAN, it must have a(n) ________.
    • A. 

      DSL

    • B. 

      WNIC

    • C. 

      ONIC

    • D. 

      UTP

  • 10. 
    The hardware component that connects a printer's circuitry to the network is called a(n) ________.
    • A. 

      Switch

    • B. 

      Router

    • C. 

      NIC

    • D. 

      Port

  • 11. 
    A private internet that is that is used exclusively within an organization is called a(n) ________.
    • A. 

      Server

    • B. 

      Router

    • C. 

      Intranet

    • D. 

      Ethernet

  • 12. 
    A(n) ________ is a piece of a message that is handled by programs that implement IP.
    • A. 

      Attribute

    • B. 

      Router

    • C. 

      Switch

    • D. 

      Packet

  • 13. 
    Which of the following is an example of a database product?
    • A. 

      SQL server

    • B. 

      ERP software

    • C. 

      Ubuntu

    • D. 

      Unix

  • 14. 
    A collection of similar records is called a(n)________.
    • A. 

      Field

    • B. 

      Matrix

    • C. 

      File

    • D. 

      Array

  • 15. 
    ________ is the process of converting a data model into tables, relationships, and data constraints.
    • A. 

      Database design

    • B. 

      Data warehousing

    • C. 

      Data mining

    • D. 

      Database aggregation

  • 16. 
    Identify the first step in transforming a data model into a relational database design.
    • A. 

      Creating foreign keys

    • B. 

      Normalizing the data and files

    • C. 

      Creating a table for each entity

    • D. 

      Representing the data relationships

  • 17. 
    A ________ is a self-describing collection of integrated records.
    • A. 

      Grid network

    • B. 

      Storage folder

    • C. 

      Database

    • D. 

      File system

  • 18. 
    Columns that belong to a different table than the one in which they reside are called ________.
    • A. 

      Operational records

    • B. 

      Parallel records

    • C. 

      Relational files

    • D. 

      Foreign keys

  • 19. 
    ________ is an example of a personal DBMS.
    • A. 

      Microsoft Access

    • B. 

      IBM DB2

    • C. 

      Oracle

    • D. 

      Microsoft SQL

  • 20. 
    Constraints on the number of entities are called ________ cardinalities.
    • A. 

      Critical

    • B. 

      Restrictive

    • C. 

      Specific

    • D. 

      Minimum

  • 21. 
    Which of the following is a developmental task of a database administrator?
    • A. 

      Validating the data model

    • B. 

      Managing security

    • C. 

      Conducting training

    • D. 

      Managing configuration change

  • 22. 
    The ________ problem is unique to a multi-user database environment.
    • A. 

      Network conflict

    • B. 

      Data redundancy

    • C. 

      Lost-update

    • D. 

      Entity collision

  • 23. 
    Each entity in a database has a unique attribute called ________.
    • A. 

      Index field

    • B. 

      Public key

    • C. 

      Foreign key

    • D. 

      Identifier

  • 24. 
    Brenda wants to find a particular report containing sales analyses of the second and third quarter. After accessing the DBMS, she should type in the keyword into a ________ form to locate what she is looking for.
    • A. 

      Report

    • B. 

      Data

    • C. 

      Query

    • D. 

      Reference

  • 25. 
    A Web store front is an example of a(n) ________.
    • A. 

      Collaborative information system

    • B. 

      Departmental information system

    • C. 

      Interenterprise information system

    • D. 

      Functional information system

  • 26. 
    The summation of all the problems of information silos leads to ________.
    • A. 

      Reduced organizational innovation

    • B. 

      Increased costs for the organization

    • C. 

      Diminishing marginal returns

    • D. 

      Diseconomies of scope

  • 27. 
    Which of the following information systems is used by a single individual?
    • A. 

      Enterprise

    • B. 

      Interenterprise

    • C. 

      Personal

    • D. 

      Workgroup

  • 28. 
    When implementing new enterprise systems, the only solution for resolving process issues and providing enterprise process management is ________.
    • A. 

      Reinforcing employees' sense of self-efficacy

    • B. 

      Developing committees and steering groups

    • C. 

      Communicating the need for the change to the employees

    • D. 

      Establishing clear and absolute contractual guidelines

  • 29. 
    The information system that a restaurant uses to order supplies and ingredients from its suppliers is an example of a(n) ________.
    • A. 

      Interenterprise information system

    • B. 

      Enterprise information system

    • C. 

      Workgroup information system

    • D. 

      Personal information system

  • 30. 
    ________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
    • A. 

      Enterprise resource planning

    • B. 

      Enterprise application integration

    • C. 

      Business process modeling notation

    • D. 

      Customer relationship management

  • 31. 
    Which of the following statements is true about resolving problems in an interenterprise information system?
    • A. 

      It usually involves a single department of an organization.

    • B. 

      It must be solved by a functional group.

    • C. 

      It requires cooperation among different, usually independently owned, organizations.

    • D. 

      It requires one or more departments within an organization to duplicate data.

  • 32. 
    Which of the following statements is true about Oracle and its ERP products?
    • A. 

      It is known for its cost-effective solutions.

    • B. 

      It is known to create easy-to-use products.

    • C. 

      It is known primarily for its retail-oriented ERP software.

    • D. 

      It is known to produce fully featured products with superior performance.

  • 33. 
    In accordance with the definition of service-oriented architecture, a service ________.
    • A. 

      Is a computer program that runs to keep the database consistent

    • B. 

      Is a repeatable task that a business needs to perform

    • C. 

      Is a suite of applications called modules

    • D. 

      Is a computer program that is used to enforce business rules

  • 34. 
    ________ is known primarily for its retail-oriented ERP software.
    • A. 

      Infor

    • B. 

      Epicor

    • C. 

      Oracle

    • D. 

      Microsoft dynamics

  • 35. 
    Which of the following is an information systems application used in manufacturing?
    • A. 

      Lead tracking

    • B. 

      Scheduling

    • C. 

      Account tracking

    • D. 

      Assessment

  • 36. 
    A(n) ________ is a computer program stored within a database that runs to keep the database consistent when certain conditions arise.
    • A. 

      Index

    • B. 

      Stored procedure

    • C. 

      Trigger

    • D. 

      Transaction

Related Topics