BCIS Final Test Questions – Flashcards

Unlock all answers in this set

Unlock answers
question
A student fills out an online admission form to register for a particular course. This is an example of the ________ component of the information system.
answer
Data
question
Abstract reasoning is the ability to ________.
answer
Make and manipulate models
question
Changing the structure of existing databases causes more organizational disruption than changing working procedures.
answer
False
question
An operating system like Windows or Linux is an example of the ________ component of an information system.
answer
Software
question
Information systems become a waste of time and money when users work with inaccurate data.
answer
True
question
Which of the following is the least critical aspect of good information?
answer
Additional data
question
Caroline asks her secretary to send information on the meetings that she needs to attend next month. Her secretary, Joanne, provides her with the details immediately, but leaves out certain additional details that are irrelevant to Caroline's requirements. Which of the following statements is true about this scenario?
answer
The information that Joanne gave was accurate and sufficient for Caroline's purpose.
question
According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases.
answer
False
question
Information is considered inefficient if ________.
answer
It is irrelevant to the subject
question
When considering different information systems alternatives, it will be helpful to consider the low-tech versus high-tech alternatives in light of the amount of work that is being moved from people to computers.
answer
True
question
Information technology and information systems are synonymous terms.
answer
False
question
Mary processes employee statistics to obtain a meaningful understanding of her organization. The data that she derives by processing becomes information.
answer
True
question
Sandra is a production manager at a soda manufacturer's bottling plant. She receives a report that contains the list of raw materials stored in the warehouse. She notices that the list also includes items that are not present in the warehouse. The list that she received would not qualify as good information because it is ________.
answer
Inaccurate
question
Which of the following is a component of an information system, but not of information technology?
answer
People
question
Data needs to be sufficient for the purpose for which it is generated.
answer
True
question
It is likely that desktop and portable computers will disappear in the next decade.
answer
True
question
The ability to construct and manipulate models is an example of abstract reasoning.
answer
True
question
According to Moore's Law, the ________.
answer
Number of transistors per square inch on an integrated chip doubles every 18 months
question
Information systems differ in the amount of work that is moved from the human side to the computer side.
answer
True
question
Mark follows certain steps to access the supplementary readings for a course when using his organization's library management system. These steps that he follows are examples of the ________ component of an information system.
answer
Procedure
question
Information systems exist to help people who work in an organization to achieve the strategies of that business.
answer
True
question
Which of the following is an example of a low-tech information system?
answer
A file of email addresses stored in an email program
question
Which of the following statements is true of good information?
answer
Good information should be based on correct and complete data
question
Which of the following is considered as information rather than mere data?
answer
The return on investment of an advertising campaign
question
Which of the following is a common description of information?
answer
Knowledge derived from data
question
Which of the following pairs of components constitutes the human side of information systems?
answer
People and procedures
question
Adobe Acrobat is an application that allows users to create and edit digital documents. This is an example of ________.
answer
Software
question
Which of the following statements is true about the quality of information?
answer
Data that arrives after a prolonged period of times is of the highest quality.
question
Globus Corp. uses a software tool to manage its supply chain. This software tool is an ________ of the company's information system.
answer
Instruction on the computer side
question
Identify a statement that differentiates information technology from information systems.
answer
One can buy information technology, but not information systems.
question
Data refers to the knowledge derived from information.
answer
False
question
Which of the following would be the most disruptive to an organization when implementing an information system?
answer
Changing reporting relationships
question
Information systems become a waste of time and money when users work with inaccurate data.
answer
True
question
Because of Moore's Law, any routine skill is liable to be outsourced to the lowest bidder.
answer
True
question
Data accuracy is a critical requirement for good information.
answer
True
question
According to the five-component framework, additional components are added to the existing component framework as the complexity of a system increases.
answer
False
question
Information technology is an assembly of hardware, software, data, procedures, and people that produces information.
answer
False
question
The CEO of an organization asks the human resources manager to send information about the rate of employee turnover in the organization for the last quarter. The manager sends the salary details of new hires during this period. This information is likely to be of little use to the CEO because it is ________.
answer
Irrelevant
question
Data accuracy is a critical requirement for good information.
answer
True
question
Which of the following is an example of computer hardware?
answer
A monitor
question
Graham & Hilda Corp. is a firm that offers enterprise software solutions to independent retailers. The firm recently entered into a contract with a major national retail chain to develop and implement proprietary software that tracks inventory, restocking, and supplier information. Which of the following actions will be most difficult to perform when implementing the new information system?
answer
Training the employees to use and manage the new system
question
Which of the following statements is true about the changes and developments foreseen by the year 2025?
answer
Traditional classrooms will be replaced by classroom in a box.
question
Which of the following terms is described as processed data or data presented in a meaningful context?
answer
Information
question
The storage controllers in a computer are an example of the ________ component of information systems.
answer
Hardware
question
Drudgen Fitness Inc. is a fitness equipment provider that markets its products through a chain of retail outlets in four states. As part of its expansion strategy, the company decides to open outlets in four more states and decides to revise its existing business processes. According to the five-component model of information systems, which of the following processes will be the least disruptive to the organization?
answer
Buying and installing new computers in the new outlets
question
In the context of information systems, which of the following statements is true of data characteristics?
answer
not freely
question
Carlos is a business student doing an internship at Bruno and Venus, a firm specializing in the export of sophisticated equipment to other countries. He finds that he is unable to create a representative chart depicting the relation between processes such as procurement, shipping, and billing. This indicates that he lacks ________ skills.
answer
abstract thinking
question
Which of the following statements is true about the quality of information?
answer
Information should be just barely sufficient for its purpose
question
Project data is data that is part of the collaboration's work product
answer
True
question
Margaret finds that calling all her senior supervisors and quality managers for a face-to-face meeting is not feasible. She arranges for a multiparty text chatting session involving all of them. This is an example of asynchronous communication.
answer
False
question
________ communication occurs within a team when all team members meet at the same time.
answer
Synchronous
question
________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration.
answer
Collaboration
question
Collaboration is defined as a group of people ________.
answer
Working together to achieve a common goal.
question
A student group that is working on a project is considered to be a collaboration if the ________.
answer
Members provide feedback on each others work
question
Being a perceptive listener is more important for a collaborator than being gregarious and dynamic.
answer
True
question
The applications team's use and the means by which they share data depend on the type of content.
answer
True
question
Collaboration tools that provide workflow control manage the activities in a process pre-defined by the group.
answer
True
question
One of the advantages of a team survey is that it is easy to determine who has not yet responded.
answer
True
question
The need for collaboration is greatest for ________ decisions.
answer
Strategic
question
A group of four painters, each painting a different wall in the same room, are not working cooperatively.
answer
False
question
Being a skilled and persuasive presenter is the most important characteristic for an effective collaborator.
answer
False
question
Project scope and initial budget is set during the starting phase of a project.
answer
True
question
Team members need not continually check the SharePoint task list for new tasks.
answer
True
question
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
answer
Managerial
question
Which of the following statements is true about working with Google Drive?
answer
Google tracks documents revisions, with brief summaries of changes made
question
Which of the following is the most important trait that an effective collaborator should have?
answer
Skillfulness at giving/receiving negative feedback
question
Which of the following is an example of a strategic decision?
answer
Deciding to open a centralized distribution system
question
In version control systems, the shared directories used to store shared documents are called libraries.
answer
True
question
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
Planning
question
Which of the following is an example of project data?
answer
Design Document
question
_______ decisions are the most structured and have very little need for collaboration.
answer
Operational
question
Identify a primary purpose of collaboration.
answer
Making decisions
question
Departmental heads should determine the computer hardware and programs that are needed for their department. This is an example of a(n) ________ decision.
answer
Managerial
question
A webinar is a tool used to facilitate asynchronous communication.
answer
False
question
Project plan and budget are prepared during the finalizing phase of project management.
answer
False
question
Feedback and iteration enable a group to produce something greater than any single person could accomplish by working independently.
answer
True
question
29 An unstructured decision process is one for which there is no agreed-on decision-making method.
answer
True
question
________ is a popular commercial webinar product used in virtual sales presentations.
answer
WebEx
question
Operational decisions are those that support operational ________.
answer
Day-to-day activities
question
Task descriptions need to be specific and worded so that it is possible to decide whether or not the task was accomplished.
answer
True
question
With Google Drive, documents are stored on the user's computer.
answer
False
question
The purpose of the planning phase of project management is to accomplish project tasks.
answer
False
question
Informing is the first and most fundamental collaboration purpose.
answer
True
question
Strategic decisions are typically not collaborative.
answer
False
question
Operational decisions require a high degree of collaboration.
answer
False
question
________ decisions are those that support broad-scope, organizational issues.
answer
Operational
question
Which of the following is a comprehensive tool for communication?
answer
Microsoft Lync
question
Which of the following statements is true of sharing a task list on Google Grid?
answer
Google Grid allows simultaneous edits
question
Files placed on Google Drive can be accessed only by user with an Gmail address
answer
False
question
________ decisions are concerned with day-to-day activities.
answer
Operational decisions
question
Which of the following is an example of a strategic decision?
answer
deciding to open a centralized distribution system
question
The main purpose of the planning phase in a project is to ________.
answer
Determine who will do what and by when
question
The applications team's use and the means by which they share data depend on the type of content.
answer
True
question
________ communication occurs within a team when all team members meet at the same time.
answer
Synchronous
question
An organization uses a formula to compute the reorder quantity of an item in inventory. This is an example of a(n) ________ decision process.
answer
Structured
question
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
think its finalizing
question
A shared file server is best suited for sharing content when there is increased risk of interference with the user's work by other team members.
answer
False
question
In version control systems, the shared directories used to store shared documents are called libraries.
answer
True
question
A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making.
answer
Unstructured
question
Managerial decisions are decisions about ________.
answer
The utilization of resources
question
Which of the following is a key difference between collaboration and cooperation?
answer
Unlike cooperation, collaboration emphasizes iteration and feedback
question
An unstructured decision process is one for which there is no agreed-on decision-making method.
answer
True
question
Discussion forums are better suited than emails in asynchronous communication because ________.
answer
They keep the discussion from getting off track
question
Microsoft Lync is an example of a comprehensive content-sharing collaboration tool.
answer
False
question
The sales process involves sales and marketing as well as outbound logistics activities.
answer
True
question
Focused cost leadership is observed when a product has the lowest cost ________.
answer
Within an industry segment
question
Establishing alliances with other organizations increases purchasing costs, though these alliances do provide competitive advantages.
answer
False
question
Information systems create competitive advantage by providing support to a product rather than by becoming a part of the product
answer
False
question
Inbound logistics constitute support activities in the value chain of manufacturing firms.
answer
False
question
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
answer
Bargaining power
question
Creating a new product to increase margin is an example of using product implementations to achieve competitive advantage.
answer
True
question
According to Porter's five forces model, in which of the following situations would a supplier have the highest bargaining power?
answer
A Houston-based vendor that is the only supplier of a patented material for many smartphone manufacturers
question
FunText is a company that owns an app used for text messaging. It recently offered a membership extension of six months without any additional charges to its existing customers who had registered for a three-year membership. By doing this, which competitive strategy did FunText implement?
answer
Locking in customers
question
In the value chain, customer service is concerned with inducing buyers to purchase the product and providing a means for them to do so.
answer
False
question
In the context of Porter's five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force.
answer
True
question
A service company checks the availability of resources before planning its projects. This activity can be classified under ________.
answer
Linkages
question
Organizations can lock in customers by making it difficult or expensive for them to move to another product.
answer
True*
question
Organizations cannot gain a competitive advantage by enhancing existing products or services.
answer
False
question
Which of the following value chain activities involves inducing buyers to purchase a product and providing a means for them to do so?
answer
Sales and marketing
question
Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service.
answer
True
question
In a manufacturing business, the materials ordering process transforms cash into a raw materials inventory.
answer
True
question
To determine if an information system delivers net savings in costs, the cost of developing and operating the information system will need to be offset against the gains in reduced errors and reduced costs for paper, ink, and printing.
answer
True
question
Which of the following value chain activities involves assisting users with handling of the products after sale, thus maintaining and enhancing the products' value?
answer
Customer service
question
A major drawback of Porter's five forces model is that it ignores the rivalry among firms in the industry.
answer
False
question
Establishing alliances with other organizations increases purchasing costs, though these alliances do provide competitive advantages.
answer
False
question
In the context of Porter's five forces model, the bargaining power of grain farmers in a surplus year is an example of a weak market force.
answer
True
question
Which of the following principles of competitive advantage is related to process implementations?
answer
Raise the barriers to market entry
question
A furniture manufacturer delivers products to his customers' houses. This is an example of inbound logistics.
answer
False
question
Organizations can lock in suppliers either by making it difficult to switch to another organization or by ________.
answer
Making it easy to work with the organization
question
Outbound logistics refers to transforming inputs into the final product.
answer
False
question
The competitive strategy of a organization is determined by its value chain
answer
False
question
Employees often resist changes in business processes.
answer
True
question
In a manufacturing business, which of the following transforms finished goods into cash?
answer
Sales process
question
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
answer
Total margin
question
Which of the following principles of competitive advantage is associated with product implementations?
answer
Differentiating service offerings
question
The automobile industry is characterized by many manufacturers and intense competition among them. According to Porter's five forces model, this statement illustrates ________.
answer
High levels of rivalry
question
In the inbound logistics activity of a value chain, the manufacturer receives, stores, and disseminates inputs to a product.
answer
True
question
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
answer
Introduced product differentiation
question
Which of the following is a primary activity in the value chain?
answer
Receiving and distributing inputs to the product
question
Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________.
answer
Switching costs
question
A retail company sells products such as agricultural produce and consumer products. The company procures materials from farmers and local producers. This process of obtaining the inputs needed for a business is called ________.
answer
Inbound logistics
question
Bargaining power of customers is likely to be the highest for markets involving ________.
answer
Industrial products
question
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
answer
Business process
question
The total margin of the value chain is the difference between the total value added and the total costs incurred.
answer
True
question
Which of the following principles of competitive advantage is related to process implementations?
answer
Reduce costs
question
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy holds the employee responsible for any kind of damage?
answer
The policy appears to be permissive without actually being so.
question
The policy appears to be permissive without actually being so.
answer
True
question
As predicted by Moore's Law, CPU speeds continually increase.
answer
True*
question
The CPU stores the results of computations on the hard drive.
answer
False
question
A server is a computer that is designed to support processing from many remote computers and users.
answer
True
question
Android applications are developed using ________ programming language.
answer
Java
question
________ refers to data delivered to the user at the precise moment it is needed.
answer
Just-in-time data
question
Random access memory is volatile.
answer
True
question
Internet of Things (IoT) is one of the disruptive forces that change the power of business, allowing objects to connect to the Internet so they can interact with other devices, applications, or services.
answer
True
question
The CPU stores the results of computations in ________.
answer
Main Memory
question
Android is a nonmobile client operating system.
answer
False
question
As predicted by Moore's Law, CPU speeds continually increase.
answer
True
question
Desktop computers and Xboxes are not mobile devices.
answer
True
question
The CPU of a computing device stores data and programs.
answer
False
question
Horizontal-market applications are developed for specific, unique needs of an industry.
answer
False
question
A BYOD (bring your own device) policy is a statement concerning employees' permissions and responsibilities when they use their own device for organizational business.
answer
True
question
Symbian is a popular operating system used on devices like iPhone, iPad, and iPod Touch.
answer
False
question
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?
answer
ARM
question
Source code is computer code ________.
answer
That is written by humans
question
Object-oriented languages cannot be used to create difficult and complex applications.
answer
False
question
An operating system is a hardware device used to input data into a computer.
answer
False
question
Mac OS and iOS applications are constructed using Java programming language.
answer
False
question
If an organization's BYOD (bring your own device) policy dictates that an employee is responsible for damage, the advantage to the organization is that it appears to be permissive without actually being so.
answer
True
question
Volatile memory devices can store data without using external power.
answer
False
question
Which of the following statements is true about operating systems?
answer
Nonmobile client operating systems are used on personal computers.
question
Which of the following is an example of storage hardware in computers?
answer
Magnetic disk
question
Which of the following is an example of storage hardware in computers?
answer
a smartphone
question
In ________ process, a server hosts many versions of desktop operating systems.
answer
desktop virtualilzation
question
A dual processor computer with 3.5 gigahertz or more is required to edit large pictures, sound, or video files.
answer
True*
question
The term "open source" means that the source code of the program is not available to the public.
answer
False
question
Native applications are also known as thick-client applications.
answer
True
question
Object-oriented languages can only be used by professional programmers who have devoted years to learning object-oriented design and coding skills.
answer
True
question
Horizontal-market applications are developed for specific, unique needs of an industry.
answer
False
question
10 TB is equivalent to ________ gigabytes.
answer
10,240
question
DenTimes, a software package installed in hospitals, is used to schedule appointments and bill patients. DenTimes is an example of ________.
answer
vertical-market application software
question
________ applications are programs that are written to use a particular operating system.
answer
Native
question
Mobile systems users can move geographically but are restricted from moving between devices.
answer
False
question
Which of the following statements is true about self-driving cars?
answer
reduction in car insurance cost fewer accidents take place
question
The term "open source" means that the source code of the program is not available to the public.
answer
False
question
Which of the following is an advantage to an organization if its BYOD (bring your own device) policy offers wireless network to mobile devices?
answer
The organization can sniff employees' mobile traffic.
question
Which of the following is an example of nonvolatile memory?
answer
optical disk
question
Machine code ________.
answer
cannot be modified by humans is written by humans cannot be processed by computers
question
Which of the following statements is true about native applications?
answer
They only run on the operating system for which they are programmed.
question
________ is installed into special, read-only memory of devices like printers and print servers or devices used for various types of communication.
answer
Firmware
question
The term "open source" means that the source code of the program is ________.
answer
available to the public
question
A thin-client application is designed to run within a program such as ________.
answer
internet explorer
question
Bits are used for computer data because they ________.
answer
are easy to represent physically
question
Programs that perform business functions, such as general ledger and accounting tasks, are examples of ________.
answer
application software
question
Which of the following is an example of an open-source desktop operating system?
answer
ubuntu
question
A client-server application that requires nothing more than a browser is called ________.
answer
a thin-client application
question
A primary key in a database is a ________.
answer
column or group of columns that identifies a unique row in a table
question
A database is a self-describing collection of integrated records.
answer
True
question
The easiest time to change the database structure is after the data modeling stage.
answer
False
question
________ is the process of converting a poorly-structured table into two or more well-structured tables.
answer
Normalization
question
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type?
answer
small oval
question
A data model is a ________.
answer
logical representation of database data
question
A student management system allows students to have multiple majors, and advisers are assigned to handle multiple students and courses. This is an example of a(n) ________ relationship.
answer
N:M
question
A(n) ________ is a request for data from a database.
answer
query
question
________ allow users to read, insert, modify, and delete data in a database.
answer
Forms
question
The forked lines on the lines representing relationship between two related entities are referred to as ________.
answer
crow's feet
question
________ in an E-R diagram refer to the least number of entities required in a relationship.
answer
Minimum cardinalities
question
A key is a column or group of columns that identifies a unique row in a table.
answer
True
question
A data model describes data and relationships that will be stored in the database.
answer
True
question
When using the relational model to represent two tables, one must ________.
answer
add a foreign key to one of the tables
question
Metadata are ________.
answer
data that describe data
question
An administrator should create a ________ before developing the database design.
answer
data model
question
A database management system (DBMS) is a program used to create, process, and administer a database.
answer
True
question
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________.
answer
data integrity problem
question
1:N, N:M, and 1:1 are common examples of minimum cardinalities, where N and M represent many relationships for two different entities.
answer
False
question
Which of the following is a developmental task of database administration?
answer
evaluating an application design
question
A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data.
answer
True
question
______ refers to data collections that are characterized by huge volume, rapid velocity, and great variety.
answer
BigData
question
In a database, ________ are grouped into columns.
answer
bytes
question
An identifier is an attribute or a group of attributes whose value is associated with one and only one entity instance.
answer
True
question
Metadata refers to special data that describe the structure of a database.
answer
True
question
Which of the following is true of single-user databases?
answer
The application, the DBMS, and the database all reside on the user's computer.
question
Which of the following is an example of a database management system?
answer
Access
question
Normalization is the process of combining two or more tables into a single table.
answer
False
question
The rows in a database are called ________.
answer
records
question
_______ are the final judges as to what data the database should contain and how the records in that database should be related to one another.
answer
Users
question
Which of the following is an international standard language for processing a database?
answer
SQL
question
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
answer
database application
question
Which of the following notations in an E-R diagram means that the entity is optional and a relationship need not have an entity of that type?
answer
small oval
question
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wants to track information such as task name, productivity of an employee on a daily basis, and employee name. These aspects that Brad wants to track are called ________.
answer
entities
question
Entities in a data model have ________ that describe the characteristics of the entity.
answer
attributes
question
In single-user databases, the application, the DBMS, and the database all reside on the user's computer.
answer
True
question
In a database, when data items are inaccurate and inconsistent with one another, it leads to a(n) ________.
answer
data integrity problem
question
The data in a database are modified and deleted. These operations of a DBMS are known as ________.
answer
processing operations
question
Which of the following is the smallest element in a database?
answer
byte
question
Identify the first step in transforming a data model into a relational database design.
answer
creating a table for each entity
question
A data integrity problem will occur only if ________.
answer
data are duplicated in a database
question
Changing a relationship from one-to-many to many-to-many in a functional database is simply a matter of changing the N:N notation to N:M.
answer
False
question
Attributes are used to describe characteristics of entities.
answer
True
question
The general goal of normalization is to construct tables such that every table has a single topic or theme.
answer
True
question
Identify the type of task performed by a database administrator when validating the data model to be used in a database management system.
answer
development
question
In an E-R diagram, a(n) ________ on a line means that at least one entity of that type is required.
answer
vertical bar
question
Each entity in a database has a unique attribute called a(n) ________.
answer
identifier
question
Albert creates a relational database to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign a unique number to each employee. This column is referred to as a ________.
answer
primary key
question
A key is a column or group of columns that identifies a unique row in a table.
answer
True
question
________ is the process of converting a data model into tables, relationships, and data constraints.
answer
Database design
question
Each table in a database must have two or more primary keys.
answer
False
question
Creating a system to record and manage the resolution of problems is the development task of a database administrator.
answer
False
question
Which of the following statements is true about a VPN?
answer
A VPN client software encrypts messages to ensure secure transmissions.
question
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
answer
layered protocol
question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?
answer
ftp
question
The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page.
answer
URL
question
Which of the following factors makes cloud-based hosting advantageous today?
answer
advent of virtualization
question
All the computers on a LAN use many public IP addresses.
answer
False
question
IEEE LAN protocols always start with the numbers 802.
answer
True
question
Computers that reside in different geographic locations are connected using a(n) ________.
answer
WAN
question
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
answer
user
question
A ________ detects the speed that a given device can handle and communicates with it at that speed.
answer
switch
question
Which of the following features distinguishes a LAN from a WAN?
answer
A LAN connects computers in a single location.
question
An intranet is a private internet that is used exclusively within an organization.
answer
True
question
Identify a characteristic of in-house hosting.
answer
control of data location
question
Which of the following would be a consequence of teleaction, a form of remote action systems?
answer
The value of local mediocrity would decrease.
question
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
answer
True
question
Which of the following is an example of IaaS?
answer
Amazon S3
question
____ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
answer
Web servers Server farms Web browsers
question
Which of the following statements is true about the IEEE 802.11ac protocol?
answer
It allows speeds of up to 1.3 Gbps. It is also known as Ethernet. It is used for wired LAN connections.
question
The ________ protocol standard is also known as Ethernet.
answer
IEEE 802.11 IEEE 802.11ac IEEE 802.3
question
Cloud resources are pooled because many different organizations use the cloud to share hardware through virtualization.
answer
True
question
Which of the following statements is true about a VPN?
answer
A VPN network does not provide users with remote access. A VPN connection utilizes private networks instead of the public network. A VPN client software encrypts messages to ensure secure transmissions.
question
To enable a seamless flow of data across the networks that comprise an internet, an elaborate scheme called a ________ is used.
answer
virtual private network three-tier system layered protocol
question
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites?
answer
ftp
question
The address bar reads "http://www.baron-olufsen.com/" when one visits the Web page of the luxury brand Baron & Olufsen. This information in the address bar is the ________ of the Web page.
answer
URL
question
Which of the following factors makes cloud-based hosting advantageous today?
answer
advent of virtualization
question
All the computers on a LAN use many public IP addresses.
answer
False
question
IEEE LAN protocols always start with the numbers 802.
answer
True
question
Computers that reside in different geographic locations are connected using a(n) ________.
answer
XML WAN LAN
question
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that request and process Web pages.
answer
user
question
A ________ detects the speed that a given device can handle and communicates with it at that speed.
answer
codec switch modem
question
Which of the following features distinguishes a LAN from a WAN?
answer
A LAN connects computers in a single location.
question
An intranet is a private internet that is used exclusively within an organization.
answer
True
question
Identify a characteristic of in-house hosting.
answer
control of data location
question
Which of the following would be a consequence of teleaction, a form of remote action systems?
answer
The value of local mediocrity would decrease. The requirement for highly skilled employees would decrease. The industries producing high value products would be unable to properly utilize teleaction.
question
The cloud is defined as the elastic leasing of pooled computer resources over the Internet.
answer
True
question
Which of the following is an example of IaaS?
answer
Amazon S3
question
____ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients.
answer
Web servers Server farms Web browsers
question
Which of the following statements is true about the IEEE 802.11ac protocol?
answer
It allows speeds of up to 1.3 Gbps. It is also known as Ethernet. It is used for wired LAN connections.
question
The ________ protocol standard is also known as Ethernet.
answer
IEEE 802.11 IEEE 802.11ac IEEE 802.3
question
Cloud resources are pooled because many different organizations use the cloud to share hardware through visualization.
answer
True
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New