Sie sind auf Seite 1von 5

Navid Okhravi | BSA_310 (ONLINE) v2 | Completed 8/29/2014 12:37 PM | 25/25 (100%)

Student's Answer

Correct r Incorrect = Partial Credit

a1) On September 9th, 1945, at 15:45 hours Grace Hopper recorded the first actual computer

"bug. What was the problem?


a) A moth stuck in a relay
b) A spider web in the computer case
c) An A/C Failure
d) A software error
e) Unknown hardware failure
.

a2) Elementary descriptions of things, events, activities, and transactions that are recorded,

classified, and stored but not organized to convey any specific meaning.
a) Knowledge
b) Project plan
c) Database
d) Statistical summary
e) Data
.

a3) Data and information are the same thing.

a) True
b) False
.

a4) A computer virus designed specifically to attack centrifuges in an Iranian nuclear facility in

2009.
a) Somerset
b) Stuxnet
c) Iranit
d) Malware
e) Stixx
.

a5) A collection of related activities that produce a product or a service of value to the

organization, its business partners, and/or its customers.


a) Business Goal
b) Business Development
c) Standard Procedure
d) Business Process
e) Strategic Alignment
.

Navid Okhravi | BSA_310 (ONLINE) v2 | Completed 8/29/2014 12:37 PM | 25/25 (100%)


a6) A law passed by Congress in 2002 with the primary goal: "To deter and punish corporate and

accounting fraud and corruption, ensure justice for wrongdoers, and protect the interests of
workers and shareholders."
a) Securities Protection Act
b) Financial Oversight and Regulation Act
c) Sarbanes-Oxley Act
d) Financial Services Modernization Act
.

a7) IT Architecture is a high-level map or plan of information assets in an organization.

a) True
b) False
.

a8) __________ is a system that uses information technology to capture, transmit, store, retrieve,

manipulate, or display information that is used in one or more business processes.


a) Information System
b) Computer System
c) System Analysis
d) Database
.

a9) According to the CNBC video "Code Wars," the United States' financial systems, power grids,

telecommunications, water supplies, flight controls and military communications are fully
protected against cyber-attacks.
a) True
b) False
.

a10) A type of network in which small units (or pieces) of data are routed through a network based

on the destination address contained within each part.


a) Circuit Switched
b) Packet Switched
c) Destination Switched
d) Priority Based Routing
e) Universal Data Switched
.

a11) In Maybury vs. Clinton (cir. 1996), the US Supreme Court ruled a person's right of privacy is

absolute.
a) True
b) False
.

Navid Okhravi | BSA_310 (ONLINE) v2 | Completed 8/29/2014 12:37 PM | 25/25 (100%)


a12) _____________________ is a unified structure that employs physical resources and

components to transform economic data into accounting information for external and internal
users.
a) Accounting Information System
b) Balance Sheet
c) General Accounting Process
d) Certified Public Accountant
e) Google
.

a13) What of the following is NOT a primary financial risk.

a) Liquidity
b) Default
c) Longevity
d) Inflation
.

a14) Supports the design, analysis, implementation, management, and optimization of business

processes.
a) Business Process Management (BPM)
b) Customer Relationship Management (CRM)
c) Enterprise Resource Planning (ERP)
d) Strategic Process Management (SPM)
.

a15) A flexible collection of computers on the Internet that perform tasks traditionally done on

corporate computers.
a) Cloud Computing
b) Storm Computing
c) Operating Cloud
d) Linux
e) Boxnet
.

Navid Okhravi | BSA_310 (ONLINE) v2 | Completed 8/29/2014 12:37 PM | 25/25 (100%)


a16)

Income Statement

a) Summarizes the company's profit or loss for a


given period

a17)

Balance Sheet

a18)

Cash Flow Statement

a19)

Asset

a20)

Liability

c) Shows the movement of cash in operating,


investing, and financing activities

a21)

Owner's Equity

d) The things owned by a business

b) Reports the assets, liabilities, and owners'


equity of a company at a point in time

e) Financial obligations
f) Financial interests (claims) of owners
.

a22) Created by Tim Berners-Lee, this framework allows documents (files) to be connected to other

documents (files) by hypertext links, enabling the user to view information by moving from one
document to another.
a) Netscape
b) Internet
c) Gopher
d) Google
e) World Wide Web
.

a23) The art of gaining access to buildings, systems or data by exploiting human psychology, rather

than by breaking in or using technical hacking techniques.


a) Social Engineering
b) "Black Hat" Hacking
c) Ethical Hacking
d) Social Extraction
e) Social Media
.

a24) Which of the following is NOT a key characteristic of a system?

a) Input
b) Output
c) Regulation
d) Processing
e) Control
.

Navid Okhravi | BSA_310 (ONLINE) v2 | Completed 8/29/2014 12:37 PM | 25/25 (100%)


a25) _________________ is the physical facilities and components which are reflected in the plan

and are supported by personnel who help to provide the services indicated by the plan.
a) IT Architecture
b) IT Infrastructure
c) IT System
d) IT Components
.

Das könnte Ihnen auch gefallen