Exam 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-To-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media101 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems98 Questions
Exam 8: Strengthening Business-To-Business Relationships Via Supply Chain and Customer Relationship Management100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Appendix: Technology Briefing: Foundations of Information Systems Infrastructure121 Questions
Select questions type
Google's Linux-based operating system for mobile devices is known as ________.
(Multiple Choice)
4.8/5
(35)
Give a brief description of the relational model of database management.
(Essay)
4.8/5
(39)
A ________ key refers to an attribute that appears as a non-primary key attribute in one entity and as a primary key attribute (or part of a primary key)in another entity.
(Multiple Choice)
4.8/5
(43)
Which of the following methods uses high-frequency light waves to transmit signals on an unobstructed path between nodes?
(Multiple Choice)
4.7/5
(46)
Which of the following operating systems was the first commercial graphical-based operating system that made its debut in 1984?
(Multiple Choice)
4.7/5
(31)
The most common database management system (DBMS)approach in use today is the relational database model.
(True/False)
4.9/5
(37)
A(n)________ network is a computer network that spans a relatively small area,allowing all computer users to connect with each other to share data and peripheral devices,such as printers.
(Multiple Choice)
4.8/5
(35)
The emergence of new computing models,such as distributed computing,has resulted in organizations completely abandoning the older centralized computing technologies.
(True/False)
5.0/5
(35)
In which of the following network topologies are all the nodes or workstations connected to a central hub through which all messages pass?
(Multiple Choice)
4.7/5
(33)
A(n)________ is a secondary storage technology that uses nonvolatile memory chips to store data.
(Multiple Choice)
4.9/5
(38)
Which of the following object-oriented programming concepts allows programmers to group objects of the same properties and behavior together?
(Multiple Choice)
4.8/5
(35)
Which of the following types of ports is used to connect networks in standard local area networks?
(Multiple Choice)
4.9/5
(36)
Data stored on disks is easier and faster to locate than data on magnetic tapes,because ________.
(Multiple Choice)
4.8/5
(39)
Secondary storage is located on the motherboard and is used to store the data and programs currently in use.
(True/False)
4.7/5
(29)
________ is a LAN protocol using packet switching developed by the Xerox Corporation in 1976.
(Multiple Choice)
4.8/5
(34)
________ are computer-aided software engineering (CASE)tools that automatically check for incomplete,inconsistent,or incorrect specifications in diagrams,screens,and reports.
(Multiple Choice)
4.8/5
(41)
A ________ key is a unique identifier that should be created and used when designing a database for each type of entity,in order to store and retrieve data accurately.
(Multiple Choice)
4.8/5
(41)
Which of the following entities is responsible for managing global and country code top-level domains,as well as global Internet protocol (IP)number space assignments?
(Multiple Choice)
4.7/5
(40)
Showing 41 - 60 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)