Exam 11: Foundations of Information Systems Infrastructure
Exam 1: Managing in the Digital World102 Questions
Exam 2: Gaining Competitive Advantage Through Information Systems101 Questions
Exam 3: Managing the Information Systems Infrastructure and Services99 Questions
Exam 4: Enabling Business-to-Consumer Electronic Commerce101 Questions
Exam 5: Enhancing Organizational Communication and Collaboration Using Social Media100 Questions
Exam 6: Enhancing Business Intelligence Using Information Systems102 Questions
Exam 7: Enhancing Business Processes Using Enterprise Information Systems90 Questions
Exam 8: Strengthening Business-to-Business Relationships via Supply Chain and Customer Relationship100 Questions
Exam 9: Developing and Acquiring Information Systems100 Questions
Exam 10: Securing Information Systems103 Questions
Exam 11: Foundations of Information Systems Infrastructure124 Questions
Select questions type
Which of the following types of ports is used to transfer one bit at a time and hence,has the slowest data transfer rates?
(Multiple Choice)
4.7/5
(32)
A ________ key is a unique identifier that should be created and used when designing a database for each type of entity,in order to store and retrieve data accurately.
(Multiple Choice)
4.9/5
(38)
A(n)________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication,typically within an area of 10 meters.
(Multiple Choice)
4.9/5
(38)
List the common types of computer software utilities and briefly explain their functions.
(Essay)
4.9/5
(38)
WLANs based on a family of standards called 802.11 are also referred to as ________.
(Multiple Choice)
4.9/5
(35)
________ is a synergistic form of distributed computing in which two or more networked computers are used to accomplish a common processing task.
(Multiple Choice)
4.8/5
(33)
Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes?
(Multiple Choice)
4.9/5
(30)
Which of the following is a secondary storage technology that uses microchips to store information?
(Multiple Choice)
4.8/5
(39)
________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data.
(Multiple Choice)
4.9/5
(40)
A(n)________ is an output device that produces a paper copy of alphanumeric or graphic data from a computer.
(Multiple Choice)
4.9/5
(30)
________ is a technique to make complex databases more efficient and more easily handled by the DBMS.
(Multiple Choice)
4.8/5
(25)
A ________ occurs if a read/write head for some reason touches one of the disks in a hard drive,leading to a loss of data.
(Multiple Choice)
4.8/5
(34)
Google's Linux-based operating system for mobile devices is known as ________.
(Multiple Choice)
4.7/5
(26)
________ is located on the motherboard and is used to store the data and programs currently in use.
(Multiple Choice)
4.7/5
(38)
________ is a computing model in which multiple types of computers are networked together to share data and services.
(Multiple Choice)
4.8/5
(37)
Which of the following character encoding formats,based on the English alphabet,represents symbols in binary form?
(Multiple Choice)
4.8/5
(29)
A(n)________ is a type of program that translates a program's source code into machine language and executes one statement at a time.
(Multiple Choice)
4.9/5
(39)
Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking?
(Multiple Choice)
4.8/5
(31)
A flash drive,located within the CPU,is a small block of memory used by processors to store those instructions most recently or most often used.
(True/False)
4.9/5
(31)
Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?
(Multiple Choice)
4.8/5
(32)
Showing 21 - 40 of 124
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)