Sie sind auf Seite 1von 7

Chapter 13 : ​Building Information System

1. In automation:
A) more manual steps are required.
B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive
tasks.
C) the nature of the business is rethought.
D) employees are enabled to perform their tasks more efficiently.
E) business processes are added.

2. The four kinds of structural organizational change enabled by IT, in order from least to most
risky, are:
A) rationalization, automation, reengineering, and redesigning.
B) rationalization, automation, reengineering, and paradigm shift.
C) automation, rationalization, redesigning, and paradigm shift.
D) automation, redesigning, restructuring, and paradigm shift.
E) paradigm shift, reengineering, rationalization, and automation.

3. The idea that the achievement of quality control is an end in itself describes a main concept of:
A) BPM.
B) BPR.
C) six sigma.
D) TQM.
E) systems analysis and design.

4. ________ provide(s) a methodology and tools for dealing with the organization's ongoing need
to revise and optimize its numerous business processes.
A) Business process redesign
B) Business process management
C) CASE tools
D) TQM
E) Systems analysis and design

5. Which process develops a detailed description of the functions that a new information system
must perform?
A) Feasibility study
B) Requirements analysis
C) Systems design
D) Test plan development
E) Management plan

6. Transferring data from a legacy system to the new system would be defined by which category
of system design specifications?
A) Input
B) Database
C) Manual procedures
D) Conversion
E) Implementation

7. The primary tool for representing a system's component processes and the flow of data between
them is the:
A) data dictionary.
B) process specifications diagram.
C) structure chart.
D) data flow diagram.
E) object-oriented chart.

8. Object-oriented development could potentially reduce the time and cost of writing software
because:
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.
E) it's not necessary to use a formal methodology to design a system.

9. As a technical project manager, you have decided to propose implementing a prototyping


methodology for a small web-based design project. What is the order of steps you will follow in
this project?
A) Develop the prototype; use the prototype; revise and enhance the prototype.
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance the
prototype.
C) Define the requirements, develop solutions, select the best prototype, and implement the
prototype.
D) Define the requirements, develop the prototype, revise and enhance the prototype.
E) Select the best prototype, define the requirements, and implement the prototype.

10. Compared to the use of proprietary components, web services promise to be less expensive and
less difficult to implement because of:
A) their ability to integrate seamlessly with legacy systems.
B) their ability to enable communication among different systems using universal standards.
C) the ubiquity of the Internet.
D) the ability to reuse web services components.
E) their use of custom programming.
Chapter 7 : ​Telecommunications, the Internet, and Wireless Technology

1. Which of the following involves slicing digital messages into parcels, transmitting them
along different communication paths, and reassembling them at their destinations?
A) Multiplexing
B) Packet shifting
C) Packet routing
D) ATM
E) Packet switching

2. In TCP/IP, IP is responsible for which of the following?


A) Disassembling and reassembling packets during transmission
B) Establishing an Internet connection between two computers
C) Moving packets over the network
D) Sequencing the transfer of packets
E) Breaking messages down into packets

3. What are the four layers of the TCP/IP reference model?


A) Physical, application, transport, and network interface
B) Physical, Application, Internet, and Network Interface
C) Application, Transport, Internet, and Network Interface
D) Application, Hardware, Internet, and Network Interface
E) Software, Hardware, Network Interface, Internet

4. Which signal types are represented by a continuous waveform?


A) Laser
B) Optical
C) Digital
D) RFID
E) Analog

5. In the domain name "http://books.azimuth-interactive.com", which element is the


second-level domain?
A) books
B) azimuth-interactive.com
C) com
D) none; there is no second-level domain in this name
E) books.azimuth-interactive

6. IPv6 has been developed in order to:


A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
E) reduce excess IP addresses.

7. Which process is used to protect transmitted data in a VPN?


A) Tunneling
B) PPP
C) VOIP
D) Packet-switching
E) Chaining

8. The WiMax standard can transmit up to a distance of approximately:


A) 30 meters.
B) 500 meters.
C) 30 miles.
D) 5 miles.
E) 70 miles.

9. A(n) ________ is a commercial organization with a permanent connection to the


Internet that sells temporary connections to retail subscribers.
A) RSS
B) WAN
C) NFP
D) ISP
E) FTP

10. Which of the following pulls content from websites and feeds it automatically to a user's
computers?
A) FTP
B) RSS
C) HTTP
D) Bluetooth
E) IPv6
Chapter 8 : Securing Information Systems

1. Which of the following refers to all of the methods, policies, and organizational
procedures that ensure the safety of the organization's assets, the accuracy and reliability
of its accounting records, and operational adherence to management standards?
A) Legacy systems
B) SSID standards
C) Vulnerabilities
D) Security policy
E) Controls

2. Which of the following statements about wireless security is ​not​ true?


A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer
programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is
capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by
eavesdroppers.

3. All of the following are specific security challenges that threaten corporate servers in a
client/server environment ​except:​
A) hacking.
B) malware.
C) denial-of-service attacks.
D) sniffing.
E) vandalism.

4. ________ is malware that hijacks a user's computer and demands payment in return for
giving back access.
A) A Trojan horse
B) Ransomware
C) Spyware
D) A virus
E) Malware

5. All of the following have contributed to an increase in software flaws ​except:​


A) the growing complexity of software programs.
B) the growing size of software programs.
C) demands for timely delivery to markets.
D) the inability to fully test programs.
E) the increase in malicious intruders seeking system access.
6. An analysis of an information system that rates the likelihood of a security incident
occurring and its cost would be included in which of the following?
A) Security policy
B) AUP
C) Risk assessment
D) Business impact analysis
E) Business continuity plan

7. Which of the following focuses primarily on the technical issues of keeping systems up
and running?
A) Business continuity planning
B) Security policies
C) Disaster recovery planning
D) An AUP
E) An information systems audit

8. A firewall allows the organization to:


A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing e-mail messages.
E) create access rules for a network.

9. In which method of encryption is a single encryption key sent to the receiver so both
sender and receiver share the same key?
A) SSL/TLS
B) Symmetric key encryption
C) Public key encryption
D) Private key encryption
E) Distributed encryption

10. Comprehensive security management products, with tools for firewalls, VPNs, intrusion
detection systems, and more, are called ________ systems.
A) DPI
B) MSSP
C) NSP
D) PKI
E) UTM

Das könnte Ihnen auch gefallen