MIS Test 2

63 Questions | Attempts: 453
Share
SettingsSettings
Please wait...
  • 1/63 Questions

    The term "open source" means that the source code of the program is ________________.

    • Available to the public
    • Only available to a select few
    • Hard to access
Please wait...

Quiz Preview

  • 2. 

    Bits are grouped into 8-bit chunks called ___________.

    • Bytes

    • Megabytes

    • Watts

    • Binary digits

    Correct Answer
    A. Bytes
  • 3. 

    Server farms are used when the _______________.

    • Sites have a large number of users and servers are organized into a collection of servers

    • Computer crashes

    • Server is private

    Correct Answer
    A. Sites have a large number of users and servers are organized into a collection of servers
  • 4. 

    A byte is a _____________.

    • Computer chip

    • Character of data

    • Database

    Correct Answer
    A. Character of data
  • 5. 

    A(n) ______________ contains the URL of the Web page to find when the user clicks it.

    • Hyperlink

    • Website

    • Database

    Correct Answer
    A. Hyperlink
  • 6. 

    SQL is a(n) ________________.

    • Query language

    • Browser

    • Identifier

    Correct Answer
    A. Query language
  • 7. 

    __________ is the process of converting a poorly structured table into two or more well-structured tables.

    • Identifying

    • Normalization

    Correct Answer
    A. Normalization
  • 8. 

    Which of the following is true about virtual private networks?

    • Creates the appearance of a private point-to-point connection

    • Creates the appearance of a public point-to-point connection

    Correct Answer
    A. Creates the appearance of a private point-to-point connection
  • 9. 

    When you buy an operating system for your personal computer, you are actual buying a software ____________.

    • Disk

    • License

    • Drive

    • Byte

    Correct Answer
    A. License
  • 10. 

    A client-server application that requires nothing more than a browser is called a _____________.

    • Thick client

    • Thin client

    Correct Answer
    A. Thin client
  • 11. 

    A _________ is a computing device that prevents unauthorized network access.

    • Browser

    • Web blocker

    • Firewall

    Correct Answer
    A. Firewall
  • 12. 

    Which of the following terms refers to a collection of servers?

    • Server farm

    • Websites

    • Multiple servers

    Correct Answer
    A. Server farm
  • 13. 

    Which of the following is a program used to create, process, and administer a database?

    • A database management system (DBMS)

    • A structured query language

    • An application program

    Correct Answer
    A. A database management system (DBMS)
  • 14. 

    Virtualization is the process where _______________.

    • One computer hosts the appearance of many computers

    • There are a lot of graphics

    • There is a collection of servers

    Correct Answer
    A. One computer hosts the appearance of many computers
  • 15. 

    ________________ communications are secure, even though they are transmitted over the internet.

    • Web

    • Internet

    • VPN

    Correct Answer
    A. VPN
  • 16. 

    Metadata are _____________.

    • Data that describe data

    • Database applications

    • Collections of bits

    Correct Answer
    A. Data that describe data
  • 17. 

    DBMS products are broadly classified into _______________.

    • Two broad categories: unified and separate

    • Two broad categories: enterprise and personal

    Correct Answer
    A. Two broad categories: enterprise and personal
  • 18. 

    Each entity has a unique attribute called ______________.

    • Crow's feet

    • Identifier

    • Model

    Correct Answer
    A. Identifier
  • 19. 

    Bits are used for computer data because they ________________.

    • Are small

    • Are easy to work with

    • Are easy to represent electronically

    Correct Answer
    A. Are easy to represent electronically
  • 20. 

    Which of the following is a program that controls the computer's resources?

    • The application system

    • The operating system

    • The budgeting system

    Correct Answer
    A. The operating system
  • 21. 

    Which of the following is a developmental task of a database administrator?

    • Create and staff DBA function

    • Form steering committee

    • Specify requirements

    • Validate data model

    • Evaluate application design

    • All of the above

    Correct Answer
    A. All of the above
  • 22. 

    Which of the following is a function of an ISP?

    • Provides you with a legitimate internet address

    • Pays for the internet

    • Serves as your gateway to the internet

    • All of the above

    Correct Answer
    A. All of the above
  • 23. 

    Which of the following is likely to be used by organizations with limited budgets?

    • Lotus notes

    • Linkedin

    • Linux with Ubantu or OpenOffice clients

    Correct Answer
    A. Linux with Ubantu or OpenOffice clients
  • 24. 

    To run a program or process data, the computer first transfers the program or data from disk to the  ____________.

    • Data channel

    • Basic components

    • Main memory

    • Software

    Correct Answer
    A. Main memory
  • 25. 

    Which of the following is an example of a closed source project?

    • Facebook

    • Microsoft office

    • Itunes

    • Amazon

    Correct Answer
    A. Microsoft office
  • 26. 

    In which of the following cases is a user using the internet, but not the web?

    • When they are using either HTTP or HTTPS

    • When they are using SMTP or FTP

    Correct Answer
    A. When they are using SMTP or FTP
  • 27. 

    A(n) is a set of rules that two communicating devices follow

    • Source code

    • Protocol

    • Machine code

    • Network

    Correct Answer
    A. Protocol
  • 28. 

    _______________ are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients.

    • Databases

    • Applications

    • Web servers

    Correct Answer
    A. Web servers
  • 29. 

    Which of the following is nonvolatile in nature?

    • Main memory and cache

    • Optical and magnetic discs

    Correct Answer
    A. Optical and magnetic discs
  • 30. 

    A ________ is equivalent to 1,024 bytes.

    • Megabyte

    • Kilobyte

    • Gigabyte

    Correct Answer
    A. Kilobyte
  • 31. 

    Which of the following is true of N:M relationships?

    • An advisor has at most one department

    • More than one entity is allowed on each side of the relationship

    • One department can have many advisors

    Correct Answer
    A. More than one entity is allowed on each side of the relationship
  • 32. 

    The application layer of the TCP/IP protocol architecture ________________.

    • Enables communication among programs (programs to programs)

    • Deals with internet routing

    • Is a reliable internet transport

    Correct Answer
    A. Enables communication among programs (programs to programs)
  • 33. 

    A _____________ is a collection of forms, reports, queries, and programs that process a database

    • Process application

    • Database application

    • Software application

    Correct Answer
    A. Database application
  • 34. 

    Entities have ______ that describe the characteristics of the entity.

    • Attributes

    • Identifiers

    • Data models

    Correct Answer
    A. Attributes
  • 35. 

    Which of the following statements is true about UTP cables?

    • They are types of cables used to connected computers, printers, switches and other devices on a LAN

    • Most LAN connections are made using UTP cables

    • The cable consists of wires that are twisted together to improve signal quality

    • If the connection carries a lot of traffic, the UTP cable may be replaced by optical fiber cables

    • All of the above

    Correct Answer
    A. All of the above
  • 36. 

    A ___________ is a column or group of columns that identifies a unique row in a table.

    • Grid

    • Key

    • Entity

    Correct Answer
    A. Key
  • 37. 

    A network of computers that appears to operate as an integrated whole is known as a(n) ___________.

    • Database

    • Byte

    • Grid

    • Processor

    Correct Answer
    A. Grid
  • 38. 

    The various computers and printers on a LAN are connected to a _______________, which is a special purpose computer that receives and transmits wired traffic on the LAN.

    • Switch

    • Modem

    • Protocol

    • IP address

    Correct Answer
    A. Switch
  • 39. 

    Which of the following is an example of vertical-market software?

    • Software installed into devices such as printers

    • Graphic programs

    • Microsoft excel

    • Inventory tracking software for an auto manufacturer

    Correct Answer
    A. Inventory tracking software for an auto manufacturer
  • 40. 

    A(n) __________ uses the internet or other internet to create the appearance of private, point to point connections.

    • VPN

    • Modem

    • HTTP

    • Data link

    Correct Answer
    A. VPN
  • 41. 

    Which of the following is one of the functions of an application program?

    • Videochat on a mac

    • Write a document or query a customer database

    • Control a computer's resources

    Correct Answer
    A. Write a document or query a customer database
  • 42. 

    Which of the following protocols guarantees a secure transmission?

    • HTTP

    • SMTP

    • HTTPS

    • FTP

    Correct Answer
    A. HTTPS
  • 43. 

    Packet-filtering firewalls perform all of the following except ______________.

    • Block websites

    • Encrypt data for transmission

    • Secure hyperlinks

    Correct Answer
    A. Encrypt data for transmission
  • 44. 

    Ronald runs both Windows 7 and Linux on his desktop computer. The process is called _________________/

    • PC virtualization

    • Server virtualization

    • Site licensing

    • Desktop virtualization

    Correct Answer
    A. PC virtualization
  • 45. 

    ________________ are commands that the CPU can process that may be specific for each processor type.

    • Operating systems

    • Databases

    • Optical disks

    • Instruction sets

    Correct Answer
    A. Instruction sets
  • 46. 

    The connection between the VPN client and the VPN server is called a(n) ___________________.

    • Bridge

    • Tunnel

    • Connector

    Correct Answer
    A. Tunnel
  • 47. 

    Which of the following statements is true of firmware?

    • It can't be changed or upgraded

    • It is easy to access

    • Users do not need to load firmware into the device's memory

    • It is more complicated than microsoft excel

    Correct Answer
    A. Users do not need to load firmware into the device's memory
  • 48. 

    The operating system employs _________ so that users can run multiple applications and files at the same time.

    • Multiple downloading

    • Mass processing

    • Memory swapping

    Correct Answer
    A. Memory swapping
  • 49. 

    Every table in a normalized database has a ______________.

    • Server

    • Single theme

    • Source code

    • Client

    Correct Answer
    A. Single theme

Quiz Review Timeline (Updated): Jan 30, 2013 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 30, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 18, 2011
    Quiz Created by
    Asr591
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.