Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 Which of the following is a device that acts as a connection point between computers and can filter and forward data to a
QUESTION 1
- Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination on a network?
a. | Hub | |
b. | Switch | |
c. | Router | |
d. | Modem |
QUESTION 2
- The Internet is based on which three key technologies?
a. | TCP/IP, HTML, and HTTP | |
b. | TCP/IP, HTTP, and packet switching | |
c. | Client/server computing, packet switching, and TCP/IP | |
d. | Client/server computing, packet switching, and HTTP |
QUESTION 3
- A(n) ______ is a device that forwards packets of data through different networks, ensuring that the data gets to the right address.
a. | modem | |
b. | router | |
c. | telnet | |
d. | hub |
QUESTION 4
- A network that covers entire geographical regions is most commonly referred to as a(n):
a. | local area network | |
b. | intranet | |
c. | peer-to-peer | |
d. | wide area network |
QUESTION 5
- Digital subscriber lines:
a. | operate over existing telephone lines to carry voice, data, and video. | |
b. | are very-high-speed data lines typically leased from long-distance telephone companies. | |
c. | have up to twenty-four 64-Kbps channels. | |
d. | are assigned to every computer on the Internet. |
QUESTION 6
- What service converts IP addresses into more recognizable alphanumeric names?
a. | HTML | |
b. | FTP | |
c. | HTTP | |
d. | DNS |
QUESTION 7
- IPv6 has been developed in order to:
a. | update the packet transmission protocols for higher bandwidth. | |
b. | create more IP addresses. | |
c. | allow for different levels of service. | |
d. | reduce excess IP addresses. |
QUESTION 8
- A VPN:
a. | is an encrypted private network configured within a public network. | |
b. | is more expensive than a dedicated network. | |
c. | is an Internet-based service for delivering voice communications. | |
d. | is a proprietary networking service technology developed by individual corporations. |
QUESTION 9
- Web browser software requests web pages from the Internet using which of the following protocols?
a. | URL | |
b. | HTTP | |
c. | DNS | |
d. | HTML |
QUESTION 10
- Which of the following statements about RFID is not true?
a. | RFIDs transmit only over a short range. | |
b. | RFIDs use an antenna to transmit data. | |
c. | Microchips embedded in RFIDs are used to store data. | |
d. | RFIDs require line-of-sight contact to be read. |
QUESTION 11
- Which conversion process introduces the system first to a limited portion of the organization?
a. | Pilot strategy | |
b. | Phased approach strategy | |
c. | Direct cutover strategy | |
d. | Parallel strategy |
QUESTION 12
- Which conversion process introduces part of the system first, then additional functionality of the system later?
a. | Pilot strategy | |
b. | Phased approach strategy | |
c. | Direct cutover strategy | |
d. | Parallel strategy |
QUESTION 13
- Which process develops a detailed description of the functions that a new information system must perform?
a. | Feasibility study. | |
b. | Requirements analysis. | |
c. | Systems design. | |
d. | Management plan. |
QUESTION 14
- The oldest method for building information systems is:
a. | component-based development | |
b. | prototyping | |
c. | object-oriented development | |
d. | the systems development life cycle |
QUESTION 15
- A systems analysis includes a(n) ______ that is used to determine whether the solution is achievable, from a financial, technical, and organizational standpoint.
a. | feasibility study | |
b. | data flow diagram | |
c. | logical design | |
d. | request for proposal |
QUESTION 16
- A software package evaluation process is often based on a series of questions sent to vendors, called a(n):
a. | systems design document. | |
b. | information systems management plan. | |
c. | request for proposal. | |
d. | logical design document. |
QUESTION 17
- The primary tool for representing a system's component processes and the flow of data between them is the:
a. | data dictionary. | |
b. | structure chart. | |
c. | data flow diagram. | |
d. | GANTT chart. |
QUESTION 18
- ______ consists of building an experimental system rapidly and inexpensively for end users to evaluate.
a. | Prototyping | |
b. | Traditional systems development | |
c. | Responsive web design | |
d. | Object-oriented development |
QUESTION 19
- ______ development focuses on rapid delivery of working software by breaking a large project into a series of small sub-projects that are completed in short periods of time using iteration and continuous feedback.
a. | Joint application | |
b. | Agile | |
c. | Object-oriented | |
d. | Traditional lifecycle |
QUESTION 20
- In Chapter 13 in the book, Vinci Energies and McAfee both went through large-scale enterprise sytems implementations using which vendor?
a. | Microsoft Dynamics. | |
b. | Oracle. | |
c. | SAP. | |
d. | NetSuite. |
QUESTION 21
- According to Chapter 14 in the book, on average, private sector IT projects underestimated budget and delivery time of systems by ____ percent.
a. | 30 | |
b. | 40 | |
c. | 50 | |
d. | 60 |
QUESTION 22
- Which of the following is not one of the five main variables affecting project success?
a. | Risk | |
b. | Vendors | |
c. | Time | |
d. | Cost |
QUESTION 23
- A firm in the financial services industry should do which of the following to ensure that it stays current with technology?
a. | Select only low-cost, low risk projects. | |
b. | Limit work to those projects with great rewards. | |
c. | Select only low-risk , high-reward projects. | |
d. | Have a few high-risk, high benefit projects. |
QUESTION 24
- You have been hired by a firm in a non-information-intensive industry to evaluate its inventory of systems and IT projects. Which types of projects should the firm focus on?
a. | High-risk projects. | |
b. | Low cost, low-benefit projects. | |
c. | High-benefit, low-risk projects. | |
d. | Low cost, high benefit projects. |
QUESTION 25
- Which of the following statements best describes the effect that project structure has on overall project risk?
a. | Highly structured projects are more complex, and run a higher risk of programmers and users misunderstanding the ultimate goals. | |
b. | Projects with relatively undefined goals are more likely to be subjected to users' changing requirements and to run a higher risk of not satisfying project goals. | |
c. | Highly structures projects tend to be larger, affecting more organizational units, and run both the risk of out-of-control costs and becoming too difficult to control. | |
d. | Less structured projects are more able to be quickly developed, tested, and implemented using cutting-edge RAD and JAD development techniques, and pose less risk of running up unforeseen costs. |
QUESTION 26
- Which type of planning tool shows each task as a horizontal bar whose length is proportional to the time required to complete it?
a. | PERT chart. | |
b. | GANTT chart. | |
c. | Scoring model. | |
d. | Portfolio analysis. |
QUESTION 27
- To review a project's tasks and their interrelationships, you would use which of the following?
a. | PERT chart. | |
b. | GANTT chart. | |
c. | Scoring model. | |
d. | Portfolio analysis. |
QUESTION 28
- Absent other information, which of the following is likely the most risky project?
a. | A large project, with high project structure, and high company experience with the technology. | |
b. | A small project, with low project structure, and low company experience with the technology. | |
c. | A small project, with low project structure, and high company experience with the technology. | |
d. | A small project, with high project structure, and low company experience with the technology. |
QUESTION 29
- Chapter 14 in the book indicates that both end user involvement and support from top management are important for most IT project implementations.
True
False
QUESTION 30
- ______ defines what work is or is not included in a project.
a. | Risk | |
b. | Scope | |
c. | Quality | |
d. | Time |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started