Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. A type of optical disk storage is the: (Points : 1) CD-ROM. WORM. MICR. all o

ID: 3771685 • Letter: 1

Question

1. A type of optical disk storage is the: (Points : 1)        CD-ROM.
       WORM.
       MICR.
       all of the above.
       a and b. Question 2. The first step in system analysis and design is: (Points : 1)        determine the budget allowed.
       interview those who will use the new system to see what will be required.
       interview the management team to see what is expected of the new system.
       examine the current system.
       determine the required due date. Question 3.3. An example of secondary storage is: (Points : 1)        printer.
       hard drive.
       virtual drive.
       cache.
       RAM. Question 4.4. Use of animation in a PowerPoint presentation: (Points : 1)        is used to emphasize areas of a slide.
       can detract from the subject of the presentation.
       is not an option. PowerPoint doesn't offer animation.
       both a and b.
       none of the above. Question 5.5. The study of business administration includes: (Points : 1)        management.
       systems analysis and design.
       pharmakentics.
       all of the above.
       only a and b. Question 6.6. In order to use ASP to maintain state within an application: (Points : 1)        the client must be able to save all cookies.
       the client must be able to save simple cookies only.
       the client must allow per-session cookies, but does not need to save them.
       the client does not need to accept cookies.
       the client must delete all cookies before signing on. Question 7.7. Organizations that make use of office automation find that: (Points : 1)        compatibility is not important across the various office units.
       emphasis should be on information requirements of the problems being solved.
       training and education are no longer as necessary because of user-friendly software.
       restructuring individual roles is not needed.
       all of the above. Question 8.8. Slack: (Points : 1)        is a measure of the model's sensitivity to the various constraints.
       is an indicator of whether or not a constraint is active.
       is the same as surplus.
       both a and b.
       none of the above. Question 9.9. An encryption message digest is called a: (Points : 1)        digital data.
       digital digest.
       digital signature.
       data digest.
       data signature. Question 10.10. Constraints are generally imposed: (Points : 1)        because it is the only correct way to formulate the model.
       because of practical considerations.
       to enable us to build the model.
       all of the above.
       only a and c. Question 11.11. Which is the fastest type of storage used in today's computers? (Points : 1)        cache memory
       main (or primary) memory
       magnetic tape
       direct access storage devices
       server storage Question 12.12. The primary operation of a system ____ facility is to collect data from the operating system or application under certain specified events. (Points : 1)        debugging
       testing
       logging
       auditing
       none of the above Question 13.13. Application level variables: (Points : 1)        keep track of multiple users in the same application.
       keep track of a single user using multiple applications.
       are stored as an array of name and value pairs.
       both a and c.
       both b and c. Question 14.14. A NIDS sensor should ____. (Points : 1)        be placed at every extranet connection except Internet access points
       be placed at every Internet access point except extranet connections
       not be placed at extranet connections or at Internet access points
       placed at every extranet connection and Internet access point
       none of the above Question 15.15. A(n) ____ client-server architecture is an example of when Web server interacts with a database. (Points : 1)        1-tier
       2-tier
       3-tier
       4-tier
       n-tier Question 16.16. Which of the following is not part of the CIA triad? (Points : 1)        Confidentiality
       Integrity
       Information
       Availability
       None of the above Question 17.17. Multiple databases can best be used together by: (Points : 1)        setting relational integrity.
       linking tables from the databases.
       relating tables from the databases.
       merging the databases.
       transferring them to Excel. Question 18.18. Which of the following are valid HTML tags? (Points : 1)        Form and Select
       Title and Body
       Paragraph and Heading
       All of the above
       Only b and c Question 19.19. In a word processor, which of the following is a style? (Points : 1)        Heading 1
       Arial
       Bold
       Word Art
       All of the above Question 20.20. To start a new paragraph in a word processing document, press the _____ key. (Points : 1)        <enter>
       <tab>
       <ctrl>
       <paragraph>
       <home> Question 21.21. In a pure prototyping approach: (Points : 1)        firms are allowed to explore the use of newer technologies.
       documentation is typically less complete than with traditional systems development approaches.
       greater security and control features than with traditional systems development approaches.
       all of the above.
       a and b. Question 22.22. Which is true? (Points : 1)        By adding scripts to your HTML code, you can establish and store variables that work with data from your page.
       By using scripts, you can add interactivity to Web pages.
       Most Web sites use some form of scripting to validate any data entered by users.
       All of the above.
       Only b and c. Question 23.23. Downfalls of EDI (Electronic data interchange) applications include: (Points : 1)        they are slow and somewhat unreliable.
       they handle business-to-business connections only.
       they are expensive for smaller businesses.
       all of the above.
       only b and c. Question 24.24. Characteristics of business today include: (Points : 1)        more complex but fewer layers of management and increased international scope.
       less complex and fewer layers of management and increased international scope.
       offering of homogeneous products.
       less reliance on accurate and timely flow of information.
       less complex and more layers of management and increased international scope. Question 25.25. Middle management is an example of _______ management level. (Points : 1)        operational
       tactical
       strategic
       organizational
       expendable Question 26.26. Cascading style sheets (CSS) allow Web programmers to: (Points : 1)        create dynamic Web pages.
       create static Web pages.
       compile JavaScript code.
       compile HTML code.
       compile BasicScript code. Question 27.27. Most network adapters can be switched into what is called ____ mode. This mode is designed to allow network administrators to use troubleshooting software to monitor all traffic passing along the network segment. (Points : 1)        private
       transparent
       aloof
       promiscuous
       none of the above Question 28.28. Risk ____ is the first step in the risk management process. (Points : 1)        penetration
       assessment
       control
       prevention
       none of the above Question 29.29. Given that int a = 8, what are the values of a and b after the operation b=++a? (Points : 1)        a=8, b=8
       a=8, b=9
       a=9, b=9
       a=8, b=10
       a=9, b=10 Question 30.30. The ____ of the session requires you to directly retrieve the values from all session variables. (Points : 1)        form collection
       QueryString collection
       contents collection
       all of the above
       either a or b Question 31.31. An example of systems software is: (Points : 1)        Windows XP, Vista, or 7.
       Microsoft Word.
       Pentium III.
       iBook.
       Cyrix. Question 32.32. When using the rule of sevens, you should avoid: (Points : 1)        seven lines per slide.
       more than seven words per line.
       words such as "a", "an", "the."
       Clipart.
       less than seven slides to a slide show. Question 33.33. The Systems Design phase includes: (Points : 1)        Input design.
       Output design.
       System Architecture.
       Database Design.
       all of the above. Question 34.34. Conceptually, the OSI reference model is a theoretical model that divides tasks necessary to manage network packets into ____ distinct layers. (Points : 1)        five
       six
       seven
       eight
       none of the above Question 35.35. A digital ____ provides a digital software item to identify an individual or organization. (Points : 1)        fingerprint
       stamp
       watermark
       certificate
       none of the above Question 36.36. The number of HTTP requests that can be processed in a unit of time is: (Points : 1)        output.
       throughout.
       orderput.
       H-S output.
       capstone. Question 37.37. In a word processor, to line up text 2.5" from the left margin: (Points : 1)        press the spacebar until it is in the correct place.
       press the tab key until you reach the 2.5" mark.
       press the tab key once and set the first tab to 2.5".
       either b or c.
       none of the above. Question 38.38. ____ assessment, in simple terms, determines whether it is more cost effective to install the necessary security controls or just accept the risk that a security threat may pose. (Points : 1)        Risk
       Loss
       Net
       Probability
       None of the above Question 39.39. In a file name, the extension of .exe means: (Points : 1)        this is an external file.
       this file is part of a larger file that has been split.
       this file is executable.
       This is a template file for divorce lawyers.
       nothing - the extension is meaningless. Question 40.40. To search for information on the population of Java, Indonesia, use a: (Points : 1)        web browser.
       e-mail server.
       Telnet Client.
       FTP site.
       database. Question 41.41. Queries can be written using: (Points : 1)        expand indicators.
       SQL.
       Access Query wizards.
       all of the above.
       only b and c. Question 42.42. Microsoft Access is used to: (Points : 1)        store related data and manipulate that data to yield information.
       store related information and manipulate that information to yield data.
       manipulate numbers to create charts.
       none of the above.
       all of the above. Question 43.43. A LAN, connected through a hub, most closely resembles which topology? (Points : 1)        bus
       tree
       mesh
       ring
       star Question 44.44. The two major encoding methods used in computers are: (Points : 1)        BYTE and NANOBYTE.
       ASCII and EBCDIC.
       BINARY and HEXADECIMAL.
       DECIMAL and OCTAL.
       BYTE and BINARY. Question 45.45. Computers that decide how best to forward each packet are called: (Points : 1)        routing computers.
       routers.
       gateway computers.
       all of the above.
       only a and b. Question 46.46. CIM (Computer-integrated manufacturing) allows manufacturers to ____ productivity and quality, and ____ lead time from the idea stage to the delivery of most products. (Points : 1)        increase, increase
       reduce, decrease
       increase, reduce
       reduce, increase
       None of the above - there is no correlation. Question 47.47. Which type of database has the least amount of redundant data? (Points : 1)        relational
       hierarchical
       network
       DBMS
       straight-line Question 48.48. To input the value 1,562.56 into a variable, then use that variable in a calculation, that variable should be declared as data type: (Points : 1)        int or Integer.
       long or Long.
       float or Single.
       double, long double or Double.
       string or String. Question 49.49. Scheduling tools include: (Points : 1)        Gantt chart.
       PERT/CPM chart.
       LCT chart.
       all of the above.
       only a and b. Question 50.50. The testing of a system is best done in what order? (Points : 1)        module testing, subsystem testing, integration testing, acceptance testing
       subsystem testing, acceptance testing, integration testing, module testing
       acceptance testing, integration testing, subsystem testing, module testing
       module testing, integration testing, subsystem testing, acceptance testing
       subsystem testing, integration testing, module testing, acceptance testing Question 51.51. Object-oriented technology potentially improves: (Points : 1)        promoting program/data independence.
       productivity.
       maintainability.
       reusability of objects.
       all of the above. Question 52.52. In a wireless network, there are ___ lines. (Points : 1)        0
       1
       5
       6
       10 Question 53.53. Another name for the transport layer data unit is: (Points : 1)        frame.
       packet.
       session.
       byte.
       word. Question 54.54. Which is not an example of a scripting language? (Points : 1)        BasicScript
       JavaScript
       VBScript
       All of the above are scripting languages
       None of the above are scripting languages Question 55.55. In the EOQ model, the ordering cost is: (Points : 1)        the total cost (transaction + cost of goods ordered).
       independent of the quantity ordered.
       dependent on the value of the delivery lead time.
       all of the above.
       both b and c. Question 56.56. The basic unit of storage in a digital computer is the: (Points : 1)        byte.
       word.
       bit.
       digit.
       spike. Question 57.57. A program you can use to show a presentation to a group is: (Points : 1)        Access.
       Excel.
       PowerPoint.
       GraphicsDesign.
       Print Shop. Question 58.58. Entering data into a computer terminal and having that entry immediately recorded in the master file is an example of: (Points : 1)        an on-line processing system.
       a batch processing system.
       an in-line system.
       a personal system.
       an update system. Question 59.59. The first step in developing a long-term operational plan is to: (Points : 1)        define IS development projects.
       assess availability of resources.
       define IS operating objectives.
       evaluate potential of projects.
       determine the project team. Question 60.60. The evolutionary development (prototyping) is feasible due to of the development of: (Points : 1)        nonprocedural languages.
       relational database management systems.
       third-generation languages.
       all of the above.
       a and b. Question 61.61. Contours may be defined as: (Points : 1)        the amount of slack on either side of a variable.
       the set of parallel functions for any given equality or inequality.
       the boundaries of the constraint set.
       all of the above.
       none of the above. Question 62.62. The term ____ is a set of rules that determines the format of data that is transmitted between electronic devices. (Points : 1)        scoreboard
       algorithm
       function
       protocol
       none of the above Question 63.63. A model: (Points : 1)        is a selective representation of reality.
       refines crude data in order to provide more useful data.
       explicitly identifies the project objectives.
       all of the above.
       only a and b. Question 64.64. When two different Linear Programming models address the same problem: (Points : 1)        the better one will make fewer assumptions.
       the better one will make more assumptions.
       the better one will is most useful to the after the cost of employing it is netted out.
       both a and c.
       both b and c. Question 65.65. The demand priority protocol is an example of: (Points : 1)        CSMA/CD protocol.
       token passing.
       reservation protocol.
       round robin protocol.
       n-tier hub. Question 66.66. The least confusing way to enter data in a database is by using: (Points : 1)        tables.
       queries.
       forms.
       reports.
       macros. Question 67.67. The script engine: (Points : 1)        is a wizard that assists in building web pages.
       executes a client-side script as the page is being loaded.
       compiles a server-side script as the page is being loaded.
       creates dynamic Web pages.
       creates static Web pages. Question 68.68. ____ security controls are the most desirable security controls. (Points : 1)        Preventive
       Detective
       Corrosive
       Corrective
       None of the above Question 69.69. The ____ program transforms clear text into cipher text. (Points : 1)        encryption
       decryption
       forensics
       steganography
       coding Question 70.70. When using solver, which of the following is true? (Points : 1)        The Target Cell must contain a formula and the Changing Cell(s) cannot contain formulas.
       The Target Cell cannot contain a formula and the Changing Cell(s) must contain formulas.
       The Target Cell and the Changing Cell(s) must contain formulas.
       The Target Cell must also be a Changing cell.
       None of the above. Question 71.71. A worm is a stand-alone malware program with its primary feature of being able to ____. (Points : 1)        infect other software packages installed in the workstation
       bypass normal user ID and password controls and allow a user access to the system
       masquerade as a legitimate program
       copy itself to other systems without action from the user
       none of the above Question 72.72. Computers on the Internet, connected to each other, that make their contents easily accessible to each other are collectively called: (Points : 1)        a LAN.
       a VAN.
       a WAN.
       The World Wide Web.
       a Server. Question 73.73. Given that int a = 8, what are the values of a and b after the operation b=a++? (Points : 1)        a=8, b=8
       a=8, b=9
       a=9, b=8
       a=9, b=9
       a=8, b=10 Question 74.74. Advantages of prototyping do not include: (Points : 1)        acceleration of several phases of the SDLC.
       aids in error detection.
       increased efficiency of development of the system.
       the prototype can be a basis of the finished product.
       none of the above. Question 75.75. The intentional collection, classification, and dissemination of information about a company, its products, and its processes is called: (Points : 1)        a database.
       knowledge management.
       data warehouse.
       data mining.
       efficiency management. Question 76.76. How many times will an "X" appear in the following loop?
{for (aLoop = 0; aLoop <4; aLoop+1)
{cout<<("X");}
} (Points : 1)        4
       5
       20
       24
       none of the above Question 77.77. In the Systems Analysis and Design phases, the System Requirements Document is produced in which stage? (Points : 1)        Systems Planning
       Systems Analysis
       Systems Design
       Systems Implementation
       Systems Operation and Support Question 78.78. Columns in a database table represent: (Points : 1)        fields.
       records.
       tuples.
       entities.
       formats. Question 79.79. Data tables are used to provide a _____ analysis. (Points : 1)        what-if
       solution manager
       solver
       none of the above
       all of the above Question 80.80. The components of an operating system include: (Points : 1)        Command layer, Service layer, Application layer.
       Command layer, Kernel, Application layer.
       Command layer, Service layer, Kernel.
       Service layer, Hardware, Application layer.
       All of the above. 1. A type of optical disk storage is the: (Points : 1)        CD-ROM.
       WORM.
       MICR.
       all of the above.
       a and b.

Explanation / Answer

WORM is

MICR (Magnetic ink character recognition code) is a character-recognition technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents.

From the listed options (a) CD-ROM is the optical disk storage is correct.

2. Software system analysis is a complex and hard activity. The first step makes a survey by gathering all the available information needed for the system elements and allocation of the requirements to the software.

3. Secondary storage a nonvolatile storage, which can also refer to data that is less frequently accessed than primary data.

From the listed options (b) Hard drive is a secondary storage is correct.

4. Use of Animation in Power point presentation is to make content interactive and entertaining and also express ideas in a more memorable way.

From the listed options (a) is used to emphasize areas of a slide is correct.

5. Business administration is management of a business. It includes all features of controlling and organizing business operations.

From the listed options (a) management is correct.

6. Cookies are a small text files stored in the user machine. It contains some information and there is no longer present in the user machine. It has an expire data. Session cookies allow users to be recognized within a website so any page changes or item or data selection, which is recollected from page to page.

Cookies need not to save or accept the cookies and also not to delete cookies before log in. Hence all the options are incorrect.

From the listed options the client must allow per-session cookies, but does not need to save them is correct.

7. Office automation states that integration of office functions usually associated to managing information. The functions are raw data storage, electronic data transfer, and the management of electronic business.

Hence the correct option is emphasis should be on information requirements of the problems being solved.

8. Slack is a variable that represents an unused quantity of resources. It replaces an

In-equality constraint with an equality constraint and a non-negativity constraint.

Surplus is a variable that represents the amount by which solution values exceed a resource.

Slack and Surplus are not same from the above defnitions. Hence the correct option (a) is a measure of the model's sensitivity to the various constraints.

9. A message digest is used to turn input of arbitrary length into an output of fixed length; a popular application of message digest is digital signature.

Hence the correct option is (c) Digital signature.

10. Constraints are the rules to develop the model. These used to formulate or design or build a system. depends on practical considerations.

All the options are correct. Hence option (d) all the above is correct.