Sunteți pe pagina 1din 2

Fundamentals of Information Technology

1. The data control protocol used to control transmissions on the Internet is:
a. CSMA-CD c. ISP
b. TCP/IP d. HTML

2. CCDC Company uses a relational database system to record its sales and purchase
transactions. When processing a credit sales invoice, an item code which was not included in
the inventory table was entered as one of the items purchased. This error reveals a problem
with:
a. Referential integrity.
b. The data dictionary.
c. The system schema and sub-schemas.
d. The SQL coding.

3. Most client/server applications operate on a three-tiered architecture consisting of which of the


following layers?
a. Desktop client, application, and database.
b. Desktop client, software, and hardware.
c. Desktop server, application, and database.
d. Desktop server, software, and hardware.

4. Virtual private networks (VPNs):


a. Use the Internet to connect remote users to corporate networks.
b. Are a service provided by value-added networks (VANs).
c. Use a technique known as VPN tunneling to avoid the need to supply usernames and
passwords in order to access the network.
d. Are usually implemented using leased lines.

5. In order to be used by the computer system, non-procedural or fourth generation (4GL)


computer languages, must be converted to:
a. Source code.
b. Assembler code.
c. Object code.
d. Structured query language.

6. A manufacturing company that wanted to be able to place material orders more efficiently most
likely would utilize which of the following?
a. Electronic check presentment.
b. Electronic data interchange.
c. Automated clearinghouse.
d. Electronic funds transfer

7. A distributed processing environment would be most beneficial in which of the following


situations?
a. Large volumes of data are generated at many locations and fast access is required.
b. Large volumes of data are generated centrally and fast access is not required.
c. Small volumes of data are generated at many locations, fast access is required, and
summaries of the data are needed promptly at a central site.
d. Small volumes of data are generated centrally, fast access is required, and summaries are
needed monthly at many locations.

8. A disaster recovery plan usually has all of the following elements except:
a. Identifying users that would be affected.
b. Identifying key personnel responsible for handling recovery operations.
c. Identifying key applications.
d. Documentation and training.

9. To prevent interrupted information systems operation, which of the following controls are
typically included in an organization's disaster recovery plan?
a. Backup and data transmission controls.
b. Data input and downtime controls.
c. Backup and downtime controls.
d. Disaster recovery and data processing controls.

10. Which of the following configurations of elements represents the most complete disaster recovery
plan?
a. Vendor contract for alternate processing site, backup procedures, names of persons on the
disaster recovery team.
b. Alternate processing site, backup and off-site storage procedures, identification of critical
applications, test of the plan.
c. Off-site storage procedures, identification of critical applications, test of the plan.
d. Vendor contract for alternate processing site, names of persons on the disaster recovery
team, offsite storage procedures.

11. What type of computerized data processing system would be most appropriate for a company
that is opening a new retail location?
a. Batch processing. c. Sequential-file processing.
b. Real-time processing. d. Direct-access processing.

12. Which of the following artificial intelligence information systems cannot learn from experience?
a. Neural networks. c. Rule-based expert systems.
b. Case-based reasoning systems. d. Intelligent agents.

13. Which of the following allows customers to pay for goods or services from a web site while
maintaining financial privacy?
a. Credit card. c. E-cash.
b. Site draft. d. Electronic check.

14. Which of the following is a computer program that appears to be legitimate but performs an
illicit activity when it is run?
a. Redundant verification. c. Web crawler.
b. Parallel count. d. Trojan horse.
c. Image processing systems.
15. Which of the following is a critical success d. Accurate universal resource locater
factor in data mining a large data store? (URL).
a. Pattern recognition.
b. Effective search engines.

16. Which of the following statements is true regarding Transmission Control Protocol and Internet
Protocol (TCP/IP)?
a. Every TCP/IP-supported transmission is an exchange of funds.
b. TCP/IP networks are limited to large mainframe computers.
c. Every site connected to a TCP/IP network has a unique address.
d. The actual physical connections among the various networks are limited to TCP/IP ports.

S-ar putea să vă placă și