Itis 2P91 Midterm Question
Itis 2P91 Midterm Question
Itis 2P91 Midterm Question
CHAPTER 1&2
Which is a set of long range goals that describe the IT infrastructure and identify the major IT
initiatives needed to achieve the goals of the organization?
A. IT architecture
B. Feasibility study
D. systems analysis
Which term describes the science of designing machines and work settings to minimize injury
and illness?
A. robotics
B. ergonomics
C. business intelligence
A. dashboard
B. expert system
C. information system
D. application
Which is data that have been organized so that they have meaning and value to an
organization?
A. database
B. information
C. knowledge
D. information system
A university registrar who uses her experience with university admissions in reviewing the
applicant grades, application essays, and letters of recommendation, would be applying her
knowledge in your application process.
A. True
B. False
Information technology is facilitating the entry of a wide variety of employees into the
workforce.
A. True
B. False
B. less sophistication
D. higher expectations
D. It is inexpensive.
Which is a strategy of producing a large quantity of items, but customizing them to fit the desire
of each customer?
A. Customer focus
B. Make-to-order
C. Mass customization
D. Personalization
Walmart’s automatic inventory replenishment system, which enables the company to reduce
inventory storage requirements, is an example of which strategy for competitive advantage? c)
Innovation
A. Cost leadership
B. Differentiation
C. Operational effectiveness
D. Customer-orientation
Which strategy for competitive advantage involves improving the manner in which an
organization executes its internal business processes?
A. Cost leadership
B. Differentiation
C. Innovation
D. Operational effectiveness
E. Customer-orientation
CHAPTER 5
1. From simplest to most complex, which is the proper order?
A. data mart
B. data warehouse
C. metadata repository
D. entity-relationship diagram
3. What does a query do?
4. Which is the data that is deemed most important in the operation of a business?
A. Metadata
B. Master data
C. Reference data
D. Tactical data
5. Which is a process designed to ensure that data within the tables in a relational
database contains the least amount of duplication?
A. Validation
B. Verification
C. Normalization
D. Modeling
6. When data are normalized, attributes in the table depend only on which?
A. secondary key
B. common attribute
C. common row
D. primary key
7. Which is the process of moving data from various sources into a data warehouse?
A. A set of instructions for applicants to apply for a position in your organization
10. Which refers to the process of quickly conducting complex, multidimensional analyses
of data stored in a database that is optimized for retrieval, typically using graphical
software tools?
A. Inferencing
C. Normalization
D. Data mining
A. Byte
B. Database
C. File
D. Record
12. As an individual student in your university's student database, you are a(n) ____________
of the STUDENT class.
A. Representative
B. Instance
C. Individual
D. Entity
13. At your univeristy, students can take more than one class, and each class has more than
one student. This is an example of which kind of relationship?
A. One-to-one
B. One-to-Many
C. Some-to-Many
D. Many-to-Many
CHAPTER 6
A. Bandwidth
B. Bandlength
C. Broadbase
D. Narrowbase
With this type of transmission, every call opens up a dedicated circuit for the duration of the
call.
A. Voice over IP
C. Chat rooms
D. Teleconference
With this type of transmission, phone calls are treated as just another kind of data.
A. Voice over IP
C. Chat rooms
D. Teleconference
Which is the technique of breaking a message into packets, sending the packets along the best
route available, and then reassembling the data?
A. packet switching
B. packet caching
C. packet trading
D. packet building
A. twisted pair
B. coaxial
C. fibre optic
D. cellular
Which converts analog signals into digital signals and vice versa?
A. front-end processors
B. Clients
C. Servers
D. Modems
Which method of connecting to the Internet operates on the same lines as telephones, and the
Internet is always available.
A. Cable
B. Dial-up
C. DSL
D. Satellite
D. Error checking.
Which of the following have been developed to ensure that computers developed by different
manufacturers can communicate?
A. Protocols
B. Client/server architectures
C. WANs
A. extranet
B. internet
C. intranet
D. insidenet
Which connects parts of the intranets of different organizations and allows secure
communications among business partners.
A. Extranet
B. Internet
C. Intranet
B. the URL
C. the URL
A. Top-level domain
C. URL
Which type of portals support communities such as hobby groups or political parties.
A. Industrywide
B. Personal
C. Affinity
D. Corporate
E. Commercial
B. Google Docs
C. a portal
CHAPTER 7
A. Business-to-employee
B. Consumer-to-consumer
C. Business-to-business
D. Business-to-consumer
A vendor asks its business partners to place logos or banners on their Web sites. If customers
click on a logo, visit the vendor’s site, and make a purchase, then the vendor pays a commission
to the partner. This scenario illustrates which business model?
B. Name-your-own-price
D. Affiliate marketing
A. Business-to-business
B. Collaborative commerce
C. Business-to-consumer
D. Consumer-to-business
A. Disintegration
C. Disintermediation
D. Value-added services
Difficulties in order fulfillment are most closely associated with which type of electronic
commerce?
A. Business-to-business
B. Business-to-consumer
C. Mobile commerce
D. Business-to-employee
Which type of advertising is automatically launched by some trigger and appears behind the
active window?
A. keyword banner
B. random banner
C. pop-up ad
D. pop-under ad
Which type of advertising offer(s) consumers incentives to accept advertising and e-mail
voluntarily?
A. Personalized marketing
B. Permission marketing
C. Paper catalogs
D. Direct mail
A. Permission marketing
B. One-to-one marketing
C. Personalized marketing
D. Viral marketing
A. Functional
B. Horizontal
C. Mixed
D. Vertical
Which marketplace model has the key mechanisms of forward auctions and electronic catalogs
that can be customized for each large buyer?
A. buy-side
B. sell-side
C. group purchasing
D. desktop purchasing
What term refers to the practice of registering or using domain names for the purpose of
profiting from the goodwill or trademark belonging to someone else?
A. Domain spoofing
B. Domain masquerading
C. Domain tasting
D. Cybersquatting
CHAPTER 8
Which systems are widely used for high-volume, long-distance, point-to-point communication?
A. GPS
B. Microwave
C. Satellite
D. Wireless
A. GEO satellites
B. LEO satellites
C. MEO satellites
D. NEO satellites
A. GEO
B. LEO
C. MEO
D. NEO
Which wireless technology is commonly used for TV and DVD remote control devices?
A. Bluetooth
B. Near-field communications
C. WiMAX
D. Infrared
Which is a wireless standard that enables temporary, short-range connection between mobile
devices?
A. Bluetooth
D. Wi-Fi
With the shortest range of any wireless network, this technology is designed to be used with
contactless credit cards.
A. Near-field communications
B. Bluetooth
C. Ultra-wideband
D. Wi-Fi
Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is
an example of which?
A. Viral marketing
B. Permission advertising
C. Location-based advertising
D. Direct marketing
A. Transaction processing
What do we call the act of locating wireless local area networks while moving around a city?
A. Eavesdropping
B. RF jamming
C. Cybersquatting
D. War driving
Although rogue access devices can be installed innocently, they can also be installed by an
attacker trying to gain unauthorized access to a wireless network. In such cases, what are these
devices called?
A. Unencrypted node
B. Evil twin
C. Open node
D. Illegal server
TG 1&2
Moore’s Law predicted that microprocessor complexity would do which?
C. Increase slowly.
D. Decrease rapidly.
Which is (are) the part of primary storage that holds a software program (or a portion of it. and
small amounts of data when they are brought from secondary storage?
A. Read-only memory
C. Cache memory
D. Registers
A. Volatile, temporary
B. Nonvolatile, permanent
C. Volatile, permanent
D. Volatile, inexpensive
Which is the type of primary storage, located closest to the CPU, where the computer can
temporarily store blocks of data used most often?
A. Read-only memory.
B. Registers.
D. Cache memory.
Which is the type of primary storage where certain critical instructions are safeguarded because
the storage is nonvolatile and the instructions can be read only by the computer and not
changed by the user?
A. Read-only memory.
C. Cache memory
D. Registers
A. Hard drives
C. DVDs
D. CDs
A. mainframe computers
B. microcomputers
C. midrange computers
D. supercomputers
A. mainframe computers
B. microcomputers
C. midrange computers
D. supercomputers
A. Joystick
B. Keyboard
C. Printer
D. RFID scanner
A. Monitor
B. Mouse
C. Printer
D. Plotter
B. Cache memory
C. RAM
D. ROM
A. Explanatory instructions
B. Documentation
Which is the set of computer instructions that provides specific functionality to a user?
B. Application software.
C. General software.
D. Systems software.
A. Open-source software
B. Software-as-a-Service
C. Object-oriented software
D. Open systems
Which is software whose source code is available at no cost to developers and users?
A. Freeware
B. Shareware
C. Open-source software
D. Software-as-a-Service
Which allows users to exert direct control of icons on the computer screen?
A. Systems software
B. Application software
D. Plug-and-play
Which is the main system control program, which supervises the overall operations of the
computer, allocates CPU time and main memory to programs, and provides an interface
between the user and the hardware.
A. application software
B. GUI
C. operating system
D. social interface
TED TALK REFLECTION
A. Primary activities
B. Support activities
C. Transaction costs
D. Economies of scale
With recent advances in technology and the Internet, what is true about transaction costs?
During the first phase of the Internet and World Wide Web, what did the encylopedia industry
experience?
A. Disintermediation
B. Vertical integration
C. Economies of scale
D. Collosal sharing
A. Crowdsourcing
B. Deconstruction
C. Economies of scale
A. Colossal sharing
B. Fragmentation
C. Disintermediation
D. Vertical integration
Which is an example of how technology changes scale economies, so that "small is beautiful".
C. Health care
ADWORDS AUTION
How does a second-price auction work?
A. The second highest bidder wins because the highest bidder has overbid and will
experience buyer's regret.
B. The second highest bidder is the winner but has to pay the highest bid.
C. The highest bidder wins but only pays the difference between his bid and the second
highest bid.
D. The highest bidder wins, but only pays the amount of the second highest bid.
Besides the bid amount, what else is included in the Ad Rank score? (Choose all that apply.)
A. keyword formatting
B. ad relevance
C. ad formats
D. conversion rate
E. landing page experience
F. click-through rate
Answer Key:B, C, E, F
If you want to pay a lower price, what can you do? (Choose all that apply.)
A. Increase your bid
B. Use Google's "ad formats"
C. Increase the quality of your site.
D. Decrease your bid.
Answer Key:B, C
If you want to move your ad up in the rankings, what can you do to increase your ad rank?
(Choose all that apply.)
A. Make multiple landing pages
B. Add Google "ad formats"
C. Increase your bid.
D. Increase the quality of your site.
Answer Key:B, C, D
Answer Key:B
C. Machine learning means the cars can learn to drive through experience.
Answer Key:C
C. Service jobs
Answer Key:B
Answer Key:A
A. Only a human, and not a computer, will be able to tell which word is real and which
word is fabricated.
B. One word is unknown and needs to be digitized and the other is known and proves
the user is a human.
C. One word needs to be digitized and the second word needs to be translated.
D. Both works are unknown and the combination of two right answers is strong proof
that the user is a human.
Answer Key:B
Before advanced information technologies were available, coordination costs limited the
number of people that could work collaboratively on a project. Large-scale achievements such
as the pyramids or landing on the moon were limited to coordinating the work of
approximately how many people?
A. 1,000 people
B. 100,000 people
C. 1,000,000 people
D. 100,000,000 people
Answer Key:B
Luis von Ahn wanted to translate the Web for free. Which did he list as major obstacles to this
objective? (Mark as many as apply.)
A. Computer translation services are not good enough yet.
B. The small size of non-English Wikipedia sites
C. Lack of bilinguals
D. Motivation to translate
Answer Key:A, C, D
Answer Key:A
What was Greenpeace's initial reaction to the poll result that chose Mr. Splashy Pants?
Answer Key:A
After the extended deadline for the poll, the percentage in favour of Mr. Splashy Pants
increased. What did Greenpeace do?
A. Named the whale Mr. Splashy Pants but discontined the online portion of the anti-
whaling campaign.
B. Named the whale Mr Splashy Pants and developed and sold related fundraising
products.
C. Named the whale Ohuna and continued with the full online anti-whaling campaign.
Answer Key:B
Relational Database
You do volunteer work at the local animal shelter. They want you to make a database to keep
track of the people who adopt pets. They would like to send each adopter a thank you letter
accompanied by a request to donations.They would also like to keep track of how many pets
were adopted out of the shelter, by the month and year. Finally, they want to be able to see if a
person has previously adopted a pet and when. Adopters are identified by household and the
shelter has decided to use the household phone number to uniquely identify each household.
Pets are identified by a tag number. A pet can only be adopted by one household. Households
may adopt more than one pet.
You have decided that two tables are required for this database, an ADOPTER table and a PET
table. List the fields that should be in the ADOPTER table.
AdopterPhone
AdopterLName
AdopterFName
AdopterAddress
You do volunteer work at the local animal shelter. They want you to make a database to keep
track of the people who adopt pets. They would like to send each adopter a thank you letter
accompanied by a request to donations.They would also like to keep track of how many pets
were adopted out of the shelter, by the month and year. Finally, they want to be able to see if a
person has previously adopted a pet and when. Adopters are identified by household and the
shelter has decided to use the household phone number to uniquely identify each household.
Pets are identified by a tag number. A pet can only be adopted by one household. Households
may adopt more than one pet.
You have decided that two tables are required for this database, an ADOPTER table and a PET
table. List the fields that should be in the PET table.
A. AdopterLName
B. AdopterPhone
C. AdopterFName
D. AdopterAddress
Answer Key:B
What is the primary key in the PET table?
A. AdopterPhone
B. PetName
C. AdoptionDate
D. TagNumber
Answer Key:D
Which field is a foreign key?
Answer Key:A
A. Mr. I.P.
Which transfers packets from one network to another? He is also a "symbol of control in a
disorganized world".
B. The firewall
D. The router
Answer Key:D
What does the proxy server do?
Answer Key:D
Which functions does the firewall perform? (Mark as many as apply.)
A.
Directs packets according to receiver's address.
B.
Sends replacement packages if acknowledgement of receipt is not received.
C.
Prevents sensitive corporate information from going out on the Web.
D.
Prevents malicious packets from entering the corporate network.
Answer Key:C, D
Answer Key:True
Where was "pay as you go" mobile phone service developed?
A. Japan
B. Africa
D. China
Answer Key:B
What does Toby Shapshak says is a critical characteristic of mobile devices in Africa?
A. Durability
D. Minimum 8 Gb storage
Answer Key:B
Which are true about M-pesa - the mobile money transfer system develped by Vodacom?
(Select all that apply.)
A. Uses Short Messaging Servce (SMS)
B. Works on flip-phones
C. Requires 4G cellular technology
D. Was initially developed in Japan
E. Requires a smart phone
F. Uses Bluetooth
G. Accounts for 40% of Kenya's GDP
Answer Key:A, B, G
Getting timely and relevant information to farmers can make the difference between
subsistance farming and abundance farming.
True
False
Answer Key:True