Reference no: EM131378237
Question-1
You want to model the growth of the sales of three different products over the past six years. You want to emphasize the growth of the total amount of sales in addition to the relative growth rates of each of the products. Which type of chart should you use?
Clustered column chart
Stacked column chart
100% stacked column chart
Pie chart
Question-2
What is the best strategy for designing a PowerPoint presentation for the first time for your organization?
Choose the template that you used for the class that you did the best in at college.
Use the Microsoft.com 5-star rating to find the most well-liked template.
Ask around to see if there is a standard template for the organization.
Use the Blank Presentation template just to be safe.
Question-3
Nonmerchant companies
sell services that they provide
include B2C, B2B, and B2G transactions
take title to the goods they sell
arrange for the purchase and sale of goods
Question-4
Which of the following is considered to be input hardware?
Video Display
Plotter
Speakers
Keyboard
Question-5
A ________ connects computers at different geographic locations.
PSDN
LAN
VPN
WAN
Question-6
Which of the following statements is TRUE with regard to system maintenance?
All commercial software products are shipped with known failures.
All organizations track system failures and enhancements using word-processing documents.
Software developers usually club enhancement requests and failures together.
IS personnel prioritize system problems on a first-come-first-served basis
Question-7
When creating a presentation, it is most important to consider making the text
readable
colorful
decorative
beautiful
Question-8
The CPU has a small amount of very fast memory called
a cache
the main memory
a data channel
serial bus
Question-9
On a spreadsheet you have just opened, the projected sales are listed by departments. You have just summed up the projected sales by each department for year 2009 using a SUMIF function. To copy the same formulas over to use for year 2010, what types of referencing should you use?
Use absolute referencing to refer to the column containing department names, but relative referencing for the rest.
Use relative referencing to refer to the column containing department names, but mixed referencing for the rest.
Use relative referencing to refer to the column containing department names, but relative referencing for the rest.
Use absolute referencing to refer to the column containing department names, but mixed referencing for the rest.
Question-10
In the Web 2.0 world, the value of a site increases
with users and use
over time
as the investments in it increase
exponentially
Question-11
A grocery scanning checkout system is an example of
a vertical-market software
a one-of-a-kind application
an operating system
a horizontal market software
Question-12
Which of the following is true of VPN?
Remote access is difficult in case of VPN.
One disadvantage of VPN is that it does not encrypt messages.
It is a virtual, private pathway over a public or shared network from the client to the server.
VPN communications are secure even though they are transmitted over the public Internet.
Question-13
System that tracks changes to documents and provides features and functions to accommodate concurrent work.
Workspace management
Content regulation
Workflow regulation
Version management
Question-14
Projects that spend so much time ________ are sometimes said to be in analysis paralysis.
on project scheduling
documenting requirements
in the system definition phase of the SDLC
designing system components
Question-15
The easiest and cheapest time to alter the information system is in the ________ phase of the SDLC.
implementation
requirements analysis
component design
system definition
Question-16
In making a financial plan, you have decided to assume sales will grow by 10% from this year's sales. The information for this year's sales is contained in cell B5. The correct formula you should type into a cell to calculate next year's sales is
=B5+B5*0.1
=1+B5*0.1
=10%*B5
=0.1*B5
Question-17
To locate something in the database, one must type in the keyword into the ________ of the application.
data column
report
query form
data entry form
Question-18
The broadest definition of ________ includes viruses, worms, Trojan horses, spyware, and adware.
software
malware
metadata
widgets
Question-19
Mark recently received an e-mail from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of
sniffing
phishing
hacking
pretexting
Question-20
Most homes and small businesses use ________ because they receive more data than they transmit.
ISDN
SDSL
ADSL
PPP
Question-21
If you were writing a report and wanted the bottom of the third page-after the title page and the table of contents-to say Page 1, what would you need to insert?
A section break
A header
A delimiter
A table
Question-22
Which of the following is true regarding an incident-response plan?
The plan should identify critical personnel and their off-hours contact information.
The plan should be simple enough to ensure a fast response with limited practice.
The plan should require minimal training on the part of employees.
The plan should provide decentralized reporting of all security incidents.
Question-23
The best way to apply a previously created style to the current document is to
click on the style; then select each line you want changed
select all paragraphs you want changed and click on the style
click on the style; then select all paragraphs you want changed
select each line you want changed and click on the style
Question-24
Which of the following is true of Web 2.0?
Its supporting technologies include HTTP and HTML.
It is supported by telephones, faxes, and EDIs.
It makes use of user-generated content and is flexible.
It is a primitive interorganizational information system
Question-25
During the ________ phase of the SDLC process, developers construct, test, and install the components of the information system.
database design
requirements analysis
feasibility assessment
implementation
Question-26
Which of the following systems for sharing content provides version control?
Google Docs
Microsoft SharePoint
Windows Live SkyDrive
File Transfer Protocol
Question-27
Which of the following is TRUE of in-house custom-developed software?
The developing company pays the adaptation costs itself.
The organization has to tailor its applications to the software.
They are less expensive than off-the-shelf software.
They are easy and comparatively cheap to make
Question-28
Which of the following stands true for enterprise DBMS products?
Paradox is an example of an enterprise DBMS product.
Most of the enterprise DBMS products are out of business today.
Enterprise DBMS products are designed for small and simple database applications.
Enterprise DBMS products support many-perhaps thousands-of users and many different database applications
Question-29
Which of the following statements is true regarding position sensitivity?
It enables security personnel to prioritize their activities in accordance with the possible risk and loss.
It applies to new employees only.
It is documented only for high-sensitivity positions.
It is a type of data safeguard.
Question-30
Which of the following is TRUE of thick-client applications?
All other things being equal, thin-client applications are preferred over thick-client applications.
With a thick-client application, a system administrator must install the new version on each user computer.
A thick-client application is an application program that need not be preinstalled on the client.
A thick-client application does not require preinstallation of client codes.