Sample Exam 3 PDF

Title Sample Exam 3
Course Introduction to Computer Based Systems
Institution University of Maryland Baltimore County
Pages 7
File Size 79.8 KB
File Type PDF
Total Downloads 95
Total Views 158

Summary

Sample exam 3...


Description

Exam 3 Sample Exam 1. Small data files that are deposited on a user's hard disk when they visit a website are called _______. A. cookies B. codes C. cache D. proxies 2. Programs used to secretly record an individual's activities on the Internet are called _______. A. spyware B. cookies C. sniffer programs D. keystroke loggers 3. This type of computer criminal creates and distributes malicious programs. A. Employee B. Hacker C. Cracker D. Keystroke logger 4. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. A. Illusion of anonymity B. Browser cache C. History files D. Privacy mode

5. Which of the following is not malware? A. Trojan horses B. Viruses C. Worms D. Ad-Aware 6. Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions? A. Marketing B. Production C. Accounting D. Research 7. Creating finished goods and services using raw materials and personnel pertains to which of the following functions? A. Marketing B. Research C. Production D. Human resources 8. Who is responsible for operational matters and monitoring day-to-day events? A. Supervisors B. Middle management C. Stockholders D. Top management

9. This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization. A. Top management B. Middle management C. Supervisors D. Stockholders 10. Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers? A. Data processing system (DPS) B. Management information system (MIS) C. Decision support system (DSS) D. Executive support system (ESS) 11. Which view of data deals with how the data is actually formatted and located? A. Physical view B. Logical view C. Information view D. Technical view 12. A collection of related fields such as a person's name, address, and age. A. Character B. Record C. Field

D.

File

13. A field that uniquely identifies each record. A. ID B. Primary key C. Common D. Numeric 14. In _______, transactions are collected over time and then processed all at once. A. batch processing B. group processing C. real-time processing D. consignment processing 15. In _______, data is processed at the same time the transaction occurs. A. Batch processing B. Group processing C. Real-time processing D. Consignment processing 16. A collection of activities and elements organized to accomplish a goal. A. Information B. Data C. Program D. System 17. In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. A. Systems implementation B. Systems analysis C. Systems design D. Systems development 18. In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system 19. Gathering and analyzing data is part of this phase. A. Preliminary investigation B. Systems analysis C. Systems design D. Systems implementation 20. Which of the following tools presents data or information flow within an information system? A. Grid chart B. Top-down analysis method C. Automated design tool D. Data flow diagram The key starts on the next page.

1. Small data files that are deposited on a user's hard disk when they visit a website are called _______. A. cookies B. codes C. cache D. proxies 2. Programs used to secretly record an individual's activities on the Internet are called _______. A. spyware B. cookies C. sniffer programs D. keystroke loggers 3. This type of computer criminal creates and distributes malicious programs. A. Employee B. Hacker C. Cracker D. Keystroke logger 4. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. A. Illusion of anonymity B. Browser cache C. History files D. Privacy mode 5. Which of the following is not malware? A. Trojan horses B. Viruses C. Worms D. Ad-Aware 6. Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions? A. Marketing B. Production C. Accounting D. Research 7. Creating finished goods and services using raw materials and personnel pertains to which of the following functions? A. Marketing B. Research C. Production D. Human resources

8. Who is responsible for operational matters and monitoring day-to-day events? A. Supervisors B. Middle management C. Stockholders D. Top management 9. This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization. A. Top management B. Middle management C. Supervisors D. Stockholders 10. Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers? A. Data processing system (DPS) B. Management information system (MIS) C. Decision support system (DSS) D. Executive support system (ESS) 11. Which view of data deals with how the data is actually formatted and located? A. Physical view B. Logical view C. Information view D. Technical view 12. A collection of related fields such as a person's name, address, and age. A. Character B. Record C. Field D. File 13. A field that uniquely identifies each record. A. ID B. Primary key C. Common D. Numeric 14. In _______, transactions are collected over time and then processed all at once. A. batch processing B. group processing C. real-time processing D. consignment processing 15. In _______, data is processed at the same time the transaction occurs. A. Batch processing B. Group processing C. Real-time processing D. Consignment processing 16. A collection of activities and elements organized to accomplish a goal. A. Information B. Data C. Program D. System

17. In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. A. Systems implementation B. Systems analysis C. Systems design D. Systems development 18. In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this. A. Prepares a preliminary investigation report B. Gathers data C. Analyzes data D. Trains users on the new system 19. Gathering and analyzing data is part of this phase. A. Preliminary investigation B. Systems analysis C. Systems design D. Systems implementation 20. Which of the following tools presents data or information flow within an information system? A. Grid chart B. Top-down analysis method C. Automated design tool D. Data flow diagram...


Similar Free PDFs