Sie sind auf Seite 1von 23

Bab 8 Question 1 Which of the following is a network in which computers and peripherals are located physically close together,

often in the same building, and does not include a radio transmitter? Correct: LAN Correct. A LAN is a network in which computers and peripherals are located physically close together, often in the same building, and does not include a radio transmitter. Question 2 In ___________, tiny radio transmitters in each node send and receive data through the air. Correct: wireless networks Correct. In wireless networks, tiny radio transmitters in each node send and receive data through the air. Question 3 Hardware devices or software programs that make it possible for messages to pass from the originating computer's LAN through a chain of intermediate networks to reach the LAN of the destination computer are called ____________. Correct: routers Correct. Hardware devices or software programs that make it possible for messages to pass from the originating computer's LAN through a chain of intermediate networks to reach the LAN of the destination computer are called routers. Question 4 ____________ carries traffic at speeds of 1 gigabit of data per second when all the LAN devices are compatible with that speed. Correct: Gigabit Ethernet Correct. Gigabit Ethernet carries traffic at speeds of 1 gigabit of data per second when all the LAN devices are compatible with that speed. Question 5 A significant delay between the time a message is sent and the time it is received is called ____________. Correct: latency Correct. A significant delay between the time a message is sent and the time it is received is called latency. Question 6 ____________ is not often used in networks due to distance and line-of-sight limitations. Correct: Infrared wireless Correct. Infrared wireless is not often used in networks due to distance and line-of-sight limitations. Question 7 A type of wireless technology named for a Danish king is ____________. Correct: Bluetooth Correct. A type of wireless technology named for a Danish king is Bluetooth. Question 8 ____________ networks use the IP packet-switching technology used by the Internet. Correct: 4G Correct. 4G networks use the IP packet-switching technology used by the Internet. Question 9 A device that uses signals broadcast by three or four visible satellites to determine its position is called a ____________.

Correct: GPS receiver Correct. A device that uses signals broadcast by three or four visible satellites to determine its position is called a GPS receiver. Question 10 A ____________ accepts, prioritizes, and processes print jobs in a client/server network. Correct: print server Correct. A print server accepts, prioritizes, and processes print jobs in a client/server network. Question 11 A ____________ is one or more computers shared between multiple users and used as storehouses for software and data. Correct: file server A file server is one or more computers shared between multiple users and used as storehouses for software and data. Question 12 SMTP, POP, and IMAP are protocols used by ____________. Correct: email programs Correct. SMTP, POP, and IMAP are protocols used by email programs. Question 13 A ____________ is a piece of invisible code that notifies the sender when an email message was opened and may report information to the sender regarding the recipient's computer or email program. Correct: Web bug A Web bug is a piece of invisible code that notifies the sender when an email message was opened and may report information to the sender regarding the recipient's computer or email program. Question 14 Unsolicited, junk email messages are called ____________. Correct: spam Correct. Unsolicited, junk email messages are called spam. Question 15 Each device on a network, including printers, scanners, computers, and drives, are called nodes. Correct: True Correct. Each device on a network, including printers, scanners, computers, and drives, are called nodes. Question 16 A blog is an online journal that is usually published on a public Web site. Correct: True Correct. A blog is an online journal that is usually published on a public Web site. Question 17 A forum provides real-time (synchronous) communication to users. Correct: False Correct. Instant messaging provides real-time (synchronous) communication to users. Question 18 Wi-Fi technology allows notebook computer users to access the Internet at hotspots. Correct: True Correct. Wi-Fi technology allows notebook computer users to access the Internet at hotspots.

Question 19 Large organizations sometimes use a backbone network to connect its WANs. Correct: False Correct. Large organizations sometimes use a backbone network to connect its LANs. Question 20 Viral digital videos carry concealed computer viruses. Correct: False Correct. Viral digital videos are videos that spread across the Internet through email messages, blog posts, Facebook updates, and IMs as a virus. Question 21 Match the following terms and acronyms to the correct definitions. 21.1 Firewall Correct: A. Software used to block unauthorized data transfers 21.2 WiMAX Correct: C. Provides Wi-Fi-style access to a 25-square mile area, and supports line-of-sight connections up to 30 miles away 21.3 Hotspot Correct: D. A wireless access point 21.4 VPN Correct: B. Uses the Internet to provide secure access to an organization's network 21.5 PAN Correct: E. A network that allows linked personal electronic devices to communicate with each other 21.6 WEP Correct: F. Provides encryption for wireless networks Bab 9 Question 1 A ____________ is a software robot that explores the Web and retrieves information about pages and indexes the information in a database. Correct: spider Correct. A spider is a software robot that explores the Web and retrieves information about pages and indexes the information in a database. Question 2 A(n) ____________ makes it possible to add or update text, images, or other Web site content without using HTML or a Web authoring program. Correct: content-management system (CMS) Correct. A content-management system (CMS) makes it possible to add or update text, images, or other Web site content without using HTML or a Web authoring program. Question 3 Adobe Dreamweaver, Microsoft Expression Web, and Apple's iWeb are examples of ____________. Correct: Web authoring software Correct. Adobe Dreamweaver, Microsoft Expression Web, and Apple's iWeb are examples of Web authoring software. Question 4 Which of the following is NOT an example of a Web portal? Correct: Froogle Correct. Froogle is NOT an example of a Web portal. Question 5 Which protocol is used to upload and download files from file servers? Correct: FTP

Correct. The FTP protocol is used to upload and download files from file servers. Question 6 ____________ files are sound files that begin to play before the file completely downloads. Correct: Streaming audio Correct. Streaming audio files are sound files that begin to play before the file completely downloads. Question 7 Which of the following is NOT an Internet programming language? Correct: FTP Correct. FTP is not an Internet programming language. Question 8 The ____________ is decentralized and is growing too fast to track. Correct: Internet Correct. The Internet is decentralized and is growing too fast to track. Question 9 A ____________ is a small portion of an Internet message that has all the information routers need to transfer sections of information from network to network toward the destination. Correct: packet Correct. A packet is a small portion of an Internet message that has all the information routers need to transfer sections of information from network to network toward the destination. Question 10 ____________ is the language of the Internet, which allows cross-network communication between different types of computers and networks. Correct: TCP/IP Correct. TCP/IP is the language of the Internet, which allows cross-network communication between different types of computers and networks. Question 11 ____________ supports multicast, which solves the shortage-of-addresses problem for IP addresses. Correct: IPv6 Correct. IPv6 supports multicast, which solves the shortage-of-addresses problem for IP addresses. Question 12 Numerical IP addresses are mapped to domain names by the Internet's ____________. Correct: domain name system (DNS) Correct. Numerical IP addresses are mapped to domain names by the Internet's domain name system (DNS). Question 13 A(n) ____________ stores applications and provides them to client programs that request them. Correct: application server Correct. An application server stores applications and provides them to client programs that request them. Question 14 The ____________ describes the separation of people who have easy access to computers and the Internet from those who do not have access. Correct: digital divide Correct. The digital divide describes the separation of people who have easy access to computers and the Internet from those who do not have access.

Question 15 A uniform resource locator (URL) is made of a protocol, the address of the host that contains the resource, and the path to the specific resource on the host. Correct: True Correct. A uniform resource locator (URL) is made of a protocol, the address of the host that contains the resource, and the path to the specific resource on the host. Question 16 The World Wide Web is a distributed browsing and searching system developed at MIT by Tim Berners-Lee. Correct: False Correct. The World Wide Web is a distributed browsing and searching system developed at CERN (European Laboratory for Particle Physics) by Tim Berners-Lee. Question 17 Facebook and Twitter are build-it-yourself Web 2.0 social networking communities. Correct: True Correct. Facebook and Twitter are build-it-yourself Web 2.0 social networking communities. Question 18 Filtering software keeps malware from invading your computer. Correct: False Correct. Filtering software keeps children out of Web sites that contain inappropriate material. Question 19 The Internet is controlled by a joint commission from the United States and China. Correct: False Correct. The Internet is not controlled by any government. Question 20 Cyberspace describes a shared virtual reality, complete with sensations such as sight and sound. Correct: True Correct. Cyberspace describes a shared virtual reality, complete with sensations such as sight and sound. Question 21 Match the following terms to the correct definition. 21.1 Applet Correct: C. Tiny application built using Java 21.2 Silverlight Correct: E. Popular client-side tool used to create interactive media-rich Web components 21.3 XML Correct: A. A markup language that represents the contextual meaning of data 21.4 XHTML Correct: D. A markup language that combines features of HTML and XML 21.5 Cookies Correct: B. Small files deposited on a visitor's hard drive that track visits, activities, and preferences 21.6 Static Web site Correct: F. A site with content that seldom changes Bab 10 Question 1 Which of the following is NOT a purpose of antivirus software? Correct: Copy the name of the virus and send it to Microsoft for inspection Correct. Copying the name of the virus and sending it to Microsoft for inspection is NOT a purpose of

antivirus software. Question 2 A type of program that gathers user information and sends it to an outside source through the Internet is called ___________. Correct: spyware Correct. A type of program that gathers user information and sends it to an outside source through the Internet is called spyware. Question 3 Which type of software plugs potential security breaches in the operating system or applications? Correct: Security patches Correct. Security patches plug potential security breaches in the operating system or applications. Question 4 ____________ technology allows multiple hard disks to operate as a single unit, providing the ability to keep copies of important data in several locations. Correct: RAID Correct. RAID technology allows multiple hard disks to operate as a single unit, providing the ability to keep copies of important data in several locations. Question 5 An ID card with a photo that contains digitally encoded identification in a built-in memory chip is called a(n) ____________. Correct: smart card Correct. An ID card with a photo that contains digitally encoded identification in a built-in memory chip is called a smart card. Question 6 A complex system that assumes almost full responsibility for a task without human input, verification, or decision making is called a(n) ____________. Correct: autonomous system Correct. A complex system that assumes almost full responsibility for a task without human input, verification, or decision making is called an autonomous system. Question 7 A(n) ____________ is a secret numerical code that allows a message to be transmitted or stored as an indecipherable garble of characters. Correct: encryption key Correct. An encryption key is a secret numerical code that allows a message to be transmitted or stored as an indecipherable garble of characters. Question 8 ____________ perform illegal hacks for political reasons, which they consider to be for the greater public good. Correct: Hactivists Correct. Hactivists perform illegal hacks for political reasons, which they consider to be for the greater public good. Question 9 A ____________ is a virus that attaches itself to documents with embedded programs that automate tasks. Correct: macro virus Correct. A macro virus is a virus that attaches itself to documents with embedded programs that automate tasks.

Question 10 A technology that collects information from computer users without their knowledge or consent is called ____________. Correct: spyware Correct. A technology that collects information from computer users without their knowledge or consent is called spyware. Question 11 A logic bomb is a type of ____________. Correct: Trojan horse Correct. A logic bomb is a type of Trojan horse. Question 12 ____________ are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of their users and owners. Correct: Zombie computers Correct. Zombie computers are Internet-connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of their users and owners. Question 13 A(n) __________ that is traditionally used on computer networks is called a symmetric secret key system. Correct: cryptosystem Correct. A cryptosystem that is traditionally used on computer networks is called a symmetric secret key system. Question 14 ____________ cause more damage to computers, networks, and programs than all the viruses put together. Correct: Bugs Correct. Bugs cause more damage to computers, networks, and programs than all the viruses put together. Question 15 All corporations in the U.S. work together with the U.S. government to protect networks. Correct: False Correct. Not All corporations in the U.S. work together with the U.S. government to protect networks. Question 16 While risks involved in computer use can be reduced, they cannot be eliminated. Correct: True Correct. While risks involved in computer use can be reduced, they cannot be eliminated. Question 17 When someone uses a disc, flash drive, or a computer network with an infected machine, a virus can jump from one computer to another. Correct: True Correct. When someone uses a disc, flash drive, or a computer network with an infected machine, a virus can jump from one computer to another. Question 18 Most computer viruses are NOT operating-system specific. Correct: False Correct. Most computer viruses are operating-system specific.

Question 19 Since synthetic DNA is possible, the efforts of biohackers to create and modify organisms in home laboratories have succeeded. Correct: False Incorrect. Refer to Inventing the Future: Evolving Technology, Evolving Security Question 20 Today's typical computer contains components from dozens of countries. Correct: True Correct. Today's typical computer contains components from dozens of countries. Question 21 Match the following terms to the correct definitions. 21.1 Phishing Correct: C. Requesting passwords and other sensitive data under false pretenses 21.2 Malware Correct: A. Malicious software 21.3 Spoofing Correct: F. Masquerading as somebody else to trick the target into doing something they might not otherwise do 21.4 Cyberstalking Correct: E. A form of harassment that takes place on the Internet 21.5 Cybercrime Correct: B. Any crime committed through use of computer or network technology 21.6 Denial-of-service attacks Correct: D. Bombard servers and Web sites with bogus traffic until they are shut down Bab 11 Question 1 Which of the following allows documents to be transmitted and stored electronically without loss of formatting? Correct: PDF Correct. PDF allows documents to be transmitted and stored electronically without loss of formatting. Question 2 When students work together on technology-enhanced projects, it is sometimes called ____________. Correct: CBCL Correct. When students work together on technology-enhanced projects, it is sometimes called CBCL. Question 3 ____________ is the use of electronic digital technology to facilitate teaching and learning. Correct: E-learning Correct. E-learning is the use of electronic digital technology to facilitate teaching and learning. Question 4 For patients in remote locations, doctors use the Web to practice ____________. Correct: telemedicine Correct. For patients in remote locations, doctors use the Web to practice telemedicine. Question 5 ____________ separates software and data from PC hardware, by using software and data stored on servers in an IT center or in the Internet cloud. Correct: Desktop virtualization Correct. Desktop virtualization separates software and data from PC hardware, by using software and data stored on servers in an IT center or in the Internet cloud.

Question 6 When a job has been transformed by automation to require less skill, it is called ____________. Correct: de-skilling Correct. When a job has been transformed by automation to require less skill, it is called de-skilling. Question 7 A(n) _____________ refers to someone who resists technological change. Correct: Luddite Correct. A Luddite refers to someone who resists technological change. Question 8 ____________ embeds lessons in animated games, in smart phone apps, or in Web-based instructional packages. Correct: CBT Correct. CBT embeds lessons in animated games, in smart phone apps, or in Web-based instructional packages. Question 9 ____________ include(s) educational programs that allow(s) students to learn through exploration and invention. Correct: Educational simulations Correct. Educational simulations include educational programs that allow students to learn through exploration and invention. Question 10 ____________ is a computer language used to teach children to program computers. Correct: LOGO Correct. LOGO is a computer language used to teach children to program computers. Question 11 ____________ is a combination of e-learning with face-to-face teaching. Correct: Blended learning Correct. Blended learning is a combination of e-learning with face-to-face teaching. Question 12 One of the fastest growing computer markets today is called ____________. Correct: SOHO Correct. One of the fastest growing computer markets today is called SOHO. Question 13 ____________ is the creation of worldwide businesses and markets. Correct: Globalization Correct. Globalization is the creation of worldwide businesses and markets. Question 14 ____________ is the fear of technology. Correct: Technophobia Correct. Technophobia is the fear of technology. Question 15 Filtering software blocks viruses from personal computers. Correct: False Correct. Filtering software allows parents to control the sites children visit.

Question 16 An electronic cottage is a small m-commerce business that sells information online. Correct: False Correct. An electronic cottage is a home where technology enables a person to work at home. Question 17 Computers are used in many fields, including entertainment, publishing, medicine, airlines, science, and education. Correct: True Correct. Computers are used in many fields, including entertainment, publishing, medicine, airlines, science, and education. Question 18 Extranets are used by partners and customers of a particular business. Correct: True Correct. Extranets are used by partners and customers of a particular business. Question 19 While early predictions stated that computers would significantly reduce the flow of paper-based information, this has not happened. Correct: True Correct. While early predictions stated that computers would significantly reduce the flow of paperbased information, this has not happened. Question 20 Narrowcasting allows for corporate news programs aimed at companies and large groups. Correct: False Correct. Narrowcasting allows for personalized news programs aimed at individuals or narrow groups. Question 21 Match the following terms to the correct definition. 21.1 Telemedicine Correct: B. Computers used to monitor vital signs from a distance. 21.2 Groupware Correct: C. Allows users to share calendars, send messages, access data, and work on documents simultaneously 21.3 Robot Correct: E. A computer-controlled machine 21.4 Thin client Correct: F. A low-cost computer that can't function without access to servers 21.5 Work flow Correct: A. The path of information as it flows through a workgroup 21.6 Electronic commerce Correct: D. Buying and selling products through the Internet Bab 12 Question 1 Which of the following models views a business as a series of activities that adds value to a product or service? Correct: Value chain Correct. A value chain model views a business as a series of activities that adds value to a product or service. Question 2 Which type of software is used by many large organizations to create and maintain large databases?

Correct: Data warehousing Correct. Data warehousing software is used by many large organizations to create and maintain large databases. Question 3 A(n) ____________ occurs when two or more companies share information. Correct: information partnership Correct. An information partnership occurs when two or more companies share information. Question 4 Selling a product to a customer, entering employee work hours, or processing a payment to a vendor are examples of which type of event in an organization? Correct: Transaction Correct. Selling a product to a customer, entering employee work hours, or processing a payment to a vendor are examples of a transaction in an organization. Question 5 ____________ refers to the flow of data between countries. Correct: Transborder data flow Correct. Transborder data flow refers to the flow of data between countries. Question 6 The direct, computer-to-computer exchange of standardized, common business transaction documents, such as purchase orders and invoices, between business partners is called ____________. Correct: electronic data interchange (EDI) Correct. The direct, computer-to-computer exchange of standardized, common business transaction documents, such as purchase orders and invoices, between business partners is called electronic data interchange (EDI). Question 7 A(n) ____________ combines features of MIS and DDS to support unstructured decision making by top managers. Correct: executive information system (EIS) Correct. An executive information system (EIS) combines features of MIS and DDS to support unstructured decision making by top managers. Question 8 Systems that provide too many reports, too many summaries, and too many details cause managers to experience ____________. Correct: information overload Correct. Systems that provide too many reports, too many summaries, and too many details cause managers to experience information overload. Question 9 An information system used at any level of a company that helps the company gain an advantage over competitors is called a(n) ____________. Correct: strategic information system Correct. An information system used at any level of a company that helps the company gain an advantage over competitors is called a strategic information system. Question 10 A set of activities that helps individuals to efficiently use resources to achieve an organization's goals is called ____________. Correct: management Correct. A set of activities that helps individuals to efficiently use resources to achieve an

organization's goals is called management. Question 11 A ____________ is a network of organizations that supply raw materials, manufacture products, and distribute products to customers. Correct: supply chain Correct. A supply chain is a network of organizations that supply raw materials, manufacture products, and distribute products to customers. Question 12 ____________ states that semiconductor technology absorbs the functions of what previously were discrete electronic components onto a single new chip. Correct: The Cannibal Principle Correct. The Cannibal Principle states that semiconductor technology absorbs the functions of what previously were discrete electronic components onto a single new chip. Question 13 A system designed to create products and services for customers is called a ____________. Correct: business organization Correct. A system designed to create products and services for customers is called a business organization. Question 14 The time, effort, and money a customer or supplier would have to expend when changing to a competitor's product or service is called ____________. Correct: switching costs Correct. The time, effort, and money a customer or supplier would have to expend when changing to a competitor's product or service is called switching costs. Question 15 An expert system is a basic accounting and record-keeping system that tracks daily transactions necessary to conduct business. Correct: False Correct. An expert system supports decision making by providing managers with access to computerized expert knowledge. Question 16 A set of interrelated parts that work together to accomplish a purpose is called a system. Correct: True Correct. A set of interrelated parts that work together to accomplish a purpose is called a system. Question 17 Strategic planning defines the company's mission, identifies the company's environment and internal strengths and weaknesses, and describes the company's competitive strategy. Correct: True Correct. Strategic planning defines the company's mission, identifies the company's environment and internal strengths and weaknesses, and describes the company's competitive strategy. Question 18 Handing the responsibility for developing and operating the information systems to another firm is called outsourcing. Correct: True Correct. Handing the responsibility for developing and operating the information systems to another firm is called outsourcing.

Question 19 Too many reports, too many printouts, too many summaries, and too many details are known as critical success factors. Correct: False Correct. Critical success factors relate to the major competitive forces, as well as the operational problems and opportunities, faced by a company. Question 20 When the primary and support activities of an organization produce the desired output with lower costs, the organization's efficiency increases. Correct: True Correct. When the primary and support activities of an organization produce the desired output with lower costs, the organization's efficiency increases. Question 21 Match the following terms to the correct definition. 21.1 GIS Correct: A. System that works with maps 21.2 GDSS Correct: E. System that enhances collaborative work 21.3 CIO Correct: B. Executive in charge of the information systems division 21.4 ES Correct: F. Provides information from a knowledgeable person 21.5 DSS Correct: C. System for making semistructured decisions 21.6 EIS Correct: D. A system that provides support for unstructured decision making by top managers Bab 13 Question 1 ____________ is the process of increasing traffic to Web sites by improving search engine rankings for targeted keywords. Correct: Search engine optimization (SEO) Correct. Search engine optimization (SEO) is the process of increasing traffic to Web sites by improving search engine rankings for targeted keywords. Question 2 The ____________ puts strict limits on what cable companies can do with customer records. Correct: Communications Act Correct. The Communications Act puts strict limits on what cable companies can do with customer records. Question 3 The _____________, issued in October 1998 by the EU, establishes a high level of legal protection for the privacy of individuals and personal data. Correct: Data Protection Directive Correct. The Data Protection Directive, issued in October 1998 by the EU, establishes a high level of legal protection for the privacy of individuals and personal data. Question 4 The trend of separating commerce into its component parts and outsourcing some of those parts is called ____________. Correct: disaggregation Correct. The trend of separating commerce into its component parts and outsourcing some of those parts is called disaggregation.

Question 5 In ____________, smart phones, tables, PDAs, laptops, and other portable electronic devices are used to conduct commerce while on the move. Correct: mobile commerce (m-commerce) Correct. In mobile commerce (m-commerce), smart phones, tables, PDAs, laptops, and other portable electronic devices are used to conduct commerce while on the move. Question 6 The ____________ is an extranet that was developed as an Internet VPN to provide a global infrastructure for trading partners within the automotive industry. Correct: Automotive Network Exchange (ANX) Correct. The Automotive Network Exchange (ANX) is an extranet that was developed as an Internet VPN to provide a global infrastructure for trading partners within the automotive industry. Question 7 A(n) ____________ uses a public network with special protocols that provide a secure, private "tunnel" across the network between business partners' intranets. Correct: virtual private network (VPN) Correct. virtual private network (VPN) uses a public network with special protocols that provide a secure, private "tunnel" across the network between business partners' intranets. Question 8 ____________ refers to methodologies, software, and Internet capabilities for managing customer relationships. Correct: Customer relationship management (CRM) Correct. Customer relationship management (CRM) refers to methodologies, software, and Internet capabilities for managing customer relationships. Question 9 The use of information and communication technology in support of business activities is called ____________. Correct: electronic business Correct. The use of information and communication technology in support of business activities is called electronic business. Question 10 ____________ were Internet businesses that commercialized the World Wide Web in the 1990s. Correct: Dot-coms Correct. Dot-coms were Internet businesses that commercialized the World Wide Web in the 1990s. Question 11 B2B, B2C, C2C, and B2E are examples of ____________. Correct: e-commerce models Correct. B2B, B2C, C2C, and B2E are examples of e-commerce models. Question 12 ____________ refers to the tail of the statistical curve that appears when you rank books, movies, or tunes by popularity as reflected in sales or rentals. Correct: Long Tail Correct. Long Tail refers to the tail of the statistical curve that appears when you rank books, movies, or tunes by popularity as reflected in sales or rentals. Question 13 ____________ is a critical part of everyday business.

Correct: Ethics Correct. Ethics is a critical part of everyday business. Question 14 The basic idea of e-commerce is that at least two parties, a business and a seller, use network technology to exchange information, products, or services. Correct: False Correct. The basic idea of e-commerce is that at least two parties, a seller and a buyer, use network technology to exchange information, products, or services. Question 15 An intranet can improve a business's bottom line by decreasing the speed of B2B transactions. Correct: False Correct. An intranet can improve a business's bottom line by increasing the speed of B2B transactions. Question 16 Facebook, MySpace, LinkedIn, and other social networking sites provide resources and services to millions of users for a small fee. Correct: False Correct. Facebook, MySpace, LinkedIn, and other social networking sites provide resources and services to millions of users at no cost. Question 17 Electronic payment systems, such as PayPal, allow people to make purchases from strangers without revealing their credit card numbers. Correct: True Correct. Electronic payment systems, such as PayPal, allow people to make purchases from strangers without revealing their credit card numbers. Question 18 eBay is an example of the consumer-to-consumer (C2C) e-commerce. Correct: True Correct. eBay is an example of the consumer-to-consumer (C2C) e-commerce. Question 19 B2C is an e-business that uses an intranet to support its internal value chain activities. Correct: False Correct. B2E is an e-business that uses an intranet to support its internal value chain activities. Question 20 The Children's Online Privacy Protection Act of 1998 (COPPA) requires consent before collecting, using, or disclosing personal information about children ages 12 and under. Correct: True Correct. The Children's Online Privacy Protection Act of 1998 (COPPA) requires consent before collecting, using, or disclosing personal information about children ages 12 and under. Question 21 Match the following terms with the correct definition. 21.1 C2C Correct: A. An individual selling his used bike to someone else through eBay 21.2 B2B Correct: B. Retail clothing store buying dresses from a designer 21.3 B2E Correct: C. Company posting a new health insurance option for employees

21.4 B2C Correct: D. Soon-to-be father buying a "How to Raise a Child" book from an online bookstore Bab 14 Question 1

Which of the following techniques is used by programmers to write algorithms in English-like statements to allow for easier coding? Correct: Pseudocode Correct. Pseudocode is used by programmers to write algorithms in English-like statements to allow for easier coding.

------------------------------------------------------------------Question 2

When converting to a new system, which approach simply replaces the old system with the new system? Correct: Direct cutover Correct. When converting to a new system, the direct cutover approach replaces the old system with the new system.

------------------------------------------------------------------Question 3

Which of the following is NOT a high-level programming language? Correct: Assembly language Correct. Assembly language is NOT a high-level programming language.

------------------------------------------------------------------Question 4

____________ is the first computer language designed for developing business software. Correct: COBOL Correct. COBOL is the first computer language designed for developing business software.

------------------------------------------------------------------Question 5

A(n) ____________ is a set of step-by-step instructions that solve a problem. Correct: algorithm Correct. An algorithm is a set of step-by-step instructions that solve a problem.

------------------------------------------------------------------Question 6

____________ is a low-level language and is functionally equivalent to machine language. Correct: Assembly language Correct. Assembly language is a low-level language and is functionally equivalent to machine language.

------------------------------------------------------------------Question 7

____________ is a programming language designed specifically for children. Correct: LOGO Correct. LOGO is a programming language designed specifically for children.

------------------------------------------------------------------Question 8

A structured program is built of smaller programs called ____________. Correct: modules Correct. A structured program is built of smaller programs called modules.

------------------------------------------------------------------Question 9

Visual programming languages, such as Visual Basic, make programming easier for ____________. Correct: nonprogrammers Correct. Visual programming languages, such as Visual Basic, make programming easier for nonprogrammers.

------------------------------------------------------------------Question 10

A(n) ____________ makes it possible for users to request information from a database using Englishlike questions. Correct: query language Correct. A query language makes it possible for users to request information from a database using English-like questions.

------------------------------------------------------------------Question 11

____________ is the best-known agile model of program development. Correct: Extreme programming Correct. Extreme programming is the best-known agile model of program development.

------------------------------------------------------------------Question 12

____________ is a page description language for Web pages. Correct: HTML Correct. HTML is a page description language for Web pages.

------------------------------------------------------------------Question 13

Two programming tools designed specifically for programming for the cloud are ____________. Correct: Bloom and Mirage Correct. Two programming tools designed specifically for programming for the cloud are Bloom and Mirage.

------------------------------------------------------------------Question 14

The person who uses information systems directly or uses the information produced by a system is called a(n) ____________. Correct: end user Correct. The person who uses information systems directly or uses the information produced by a system is called an end user.

------------------------------------------------------------------Question 15

Database management, graphics, artificial intelligence, and networks are examples of specializations within the field of computer science. Correct: True Correct. Database management, graphics, artificial intelligence, and networks are examples of specializations within the field of computer science.

------------------------------------------------------------------Question 16

The programming process is called an algorithm. Correct: False Correct. The programming process is made up of four steps: defining the problem; devising, refining,

and testing the algorithm; writing the program; and testing and debugging the program.

------------------------------------------------------------------Question 17

Logic errors are caused by errors in the logical structure, which results in differences between what the program is supposed to do and what it actually does. Correct: True Correct. Logic errors are caused by errors in the logical structure, which results in differences between what the program is supposed to do and what it actually does.

------------------------------------------------------------------Question 18

Assembly language makes it easy to reuse features from one program in another program. Correct: False Correct. Object-oriented languages make it easy to reuse features from one program in another program.

------------------------------------------------------------------Question 19

A compiler is used to translate high-level programs to machine language. Correct: True Correct. A compiler is used to translate high-level programs into machine language.

------------------------------------------------------------------Question 20

It is impossible to eliminate 100 percent of bugs in commercial software. Correct: True

Correct. It is impossible to eliminate 100 percent of bugs in commercial software.

------------------------------------------------------------------Question 21

Match the following terms with the correct definition. -------------------------------------21.1 System flowchart Correct: B. Graphical depiction of the physical system that exists or is proposed -------------------------------------21.2 Data flow diagram (DFD) Correct: D. Simple graphical depiction of the movement of data through a system -------------------------------------21.3 Data dictionary Correct: E. Catalog of all the data descriptions in a system -------------------------------------21.4 Decision table Correct: A. Shows the rules that apply and which actions to take when certain conditions occur -------------------------------------21.5 Data structure Correct: C. Set of data elements used together -------------------------------------21.6 Computer-aided systems engineering (CASE) Correct: F. Software package that includes charting tools, data dictionary, and code generators Bab 15

1.
The underlying meaning of words and phrases is called ____________. Your Answer: semantics Correct. The underlying meaning of words and phrases is called semantics.

2.
____________ is a humanoid robot developed by Honda that can walk, run, recognize gestures and faces, and display "intelligent" behaviors.

Your Answer: ASIMO Correct. ASIMO is a humanoid robot developed by Honda that can walk, run, recognize gestures and faces, and display "intelligent" behaviors.

3.
____________ can make knowledge available, even when experts are unavailable. Your Answer: Expert systems Correct. Expert systems can make knowledge available, even when experts are unavailable.

4.
____________ are used in scientific research, loan processing, stock market analysis, and to detect credit card fraud. Your Answer: Neural nets Correct. Neural nets are used in scientific research, loan processing, stock market analysis, and to detect credit card fraud.

5.
The root of the Czech word for "forced labor" is the term ____________. Your Answer: robot Correct. The root of the Czech word for "forced labor" is the term robot.

6.
A(n) ____________ is the point where old models will have to be discarded because of the creation of greater-than-human intelligence. Your Answer: singularity Correct. A singularity is the point where old models will have to be discarded because of the creation of greater-than-human intelligence.

7.
AI concepts applied to networks instead of to individual computers is called ____________. Your Answer: distributed intelligence Correct. AI concepts applied to networks instead of to individual computers is called distributed intelligence.

8.
____________ was one of the first software programs that used a limited form of natural language to converse. Your Answer: ELIZA Correct. ELIZA was one of the first software programs that used a limited form of natural language to converse.

Das könnte Ihnen auch gefallen