Documente Academic
Documente Profesional
Documente Cultură
1. The data control protocol used to control transmissions on the Internet is:
a. CSMA-CD c. ISP
b. TCP/IP d. HTML
2. CCDC Company uses a relational database system to record its sales and purchase
transactions. When processing a credit sales invoice, an item code which was not included in
the inventory table was entered as one of the items purchased. This error reveals a problem
with:
a. Referential integrity.
b. The data dictionary.
c. The system schema and sub-schemas.
d. The SQL coding.
6. A manufacturing company that wanted to be able to place material orders more efficiently most
likely would utilize which of the following?
a. Electronic check presentment.
b. Electronic data interchange.
c. Automated clearinghouse.
d. Electronic funds transfer
8. A disaster recovery plan usually has all of the following elements except:
a. Identifying users that would be affected.
b. Identifying key personnel responsible for handling recovery operations.
c. Identifying key applications.
d. Documentation and training.
9. To prevent interrupted information systems operation, which of the following controls are
typically included in an organization's disaster recovery plan?
a. Backup and data transmission controls.
b. Data input and downtime controls.
c. Backup and downtime controls.
d. Disaster recovery and data processing controls.
10. Which of the following configurations of elements represents the most complete disaster recovery
plan?
a. Vendor contract for alternate processing site, backup procedures, names of persons on the
disaster recovery team.
b. Alternate processing site, backup and off-site storage procedures, identification of critical
applications, test of the plan.
c. Off-site storage procedures, identification of critical applications, test of the plan.
d. Vendor contract for alternate processing site, names of persons on the disaster recovery
team, offsite storage procedures.
11. What type of computerized data processing system would be most appropriate for a company
that is opening a new retail location?
a. Batch processing. c. Sequential-file processing.
b. Real-time processing. d. Direct-access processing.
12. Which of the following artificial intelligence information systems cannot learn from experience?
a. Neural networks. c. Rule-based expert systems.
b. Case-based reasoning systems. d. Intelligent agents.
13. Which of the following allows customers to pay for goods or services from a web site while
maintaining financial privacy?
a. Credit card. c. E-cash.
b. Site draft. d. Electronic check.
14. Which of the following is a computer program that appears to be legitimate but performs an
illicit activity when it is run?
a. Redundant verification. c. Web crawler.
b. Parallel count. d. Trojan horse.
c. Image processing systems.
15. Which of the following is a critical success d. Accurate universal resource locater
factor in data mining a large data store? (URL).
a. Pattern recognition.
b. Effective search engines.
16. Which of the following statements is true regarding Transmission Control Protocol and Internet
Protocol (TCP/IP)?
a. Every TCP/IP-supported transmission is an exchange of funds.
b. TCP/IP networks are limited to large mainframe computers.
c. Every site connected to a TCP/IP network has a unique address.
d. The actual physical connections among the various networks are limited to TCP/IP ports.