Presentation is loading. Please wait.

Presentation is loading. Please wait.

A1 B2 C4 A3G3 A8 G6 I3 B1 A6 B4 B3 B6 F8 I6 B7 C1 C2 H7 H4 A5 G7 C6 C7 H2D2 D4G4 D5 F2 D8 D7 E1 F5 E4 E3 H5 E6 I7E7 F1 D6 F4 F3 E2 I5 F6 F7 G1 G2 D3 C5G5.

Similar presentations


Presentation on theme: "A1 B2 C4 A3G3 A8 G6 I3 B1 A6 B4 B3 B6 F8 I6 B7 C1 C2 H7 H4 A5 G7 C6 C7 H2D2 D4G4 D5 F2 D8 D7 E1 F5 E4 E3 H5 E6 I7E7 F1 D6 F4 F3 E2 I5 F6 F7 G1 G2 D3 C5G5."— Presentation transcript:

1

2 A1 B2 C4 A3G3 A8 G6 I3 B1 A6 B4 B3 B6 F8 I6 B7 C1 C2 H7 H4 A5 G7 C6 C7 H2D2 D4G4 D5 F2 D8 D7 E1 F5 E4 E3 H5 E6 I7E7 F1 D6 F4 F3 E2 I5 F6 F7 G1 G2 D3 C5G5 A4 G8C8 H1 I2 I4 H3 B8 H6 H8 E5 I1D1 B5 A2 C3 A7 I8E8 The Game Board!

3  IT infrastructure technology is the set of physical devices required to operate the entire enterprise. A. TRUE TRUE B. FALSE FALSE

4  Today, most system and application software is custom built by in-house programmers. A. TRUE TRUE B. FALSE FALSE

5  Systems integration means ensuring the legacy systems work with new elements of the infrastructure. A. TRUE TRUE B. FALSE FALSE

6  A mainframe is a type of legacy workstation. A. TRUE TRUE B. FALSE FALSE

7  Client/server computing is the most widely used form of centralized processing. A. TRUE TRUE B. FALSE FALSE

8  Application server software is responsible for locating and managing stored Web pages. A. TRUE TRUE B. FALSE FALSE

9  Using an online storage service such as DropBox is a type of virtualization. A. TRUE TRUE B. FALSE FALSE

10  In cloud computing, rapid elasticity refers to the ability of computing resources to be quickly altered to meet demand. A. TRUE TRUE B. FALSE FALSE

11  A private cloud is operated by a single organization but may be managed by a third party and be located off premises. A. TRUE TRUE B. FALSE FALSE

12  A computer language translation program is an example of system software. A. TRUE TRUE B. FALSE FALSE

13  Hypertext markup language specifies how text, graphics, video, and sound are placed on a document. A. TRUE TRUE B. FALSE FALSE

14  Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. A. TRUE TRUE B. FALSE FALSE

15  The collection of Web services that are used to build a firm's software systems constitutes what is known as a service-oriented architecture. A. TRUE TRUE B. FALSE FALSE

16  In a ________ computing model, companies use their own infrastructure for essential computing tasks and adopt public cloud computing for less critical operations or additional processing during peak business periods. A. scalable scalable B. quantum quantum C. autonomic autonomic D. hybrid cloud hybrid cloud

17  Software that manages the resources of the computer is called: A. system software. system software. B. application software. application software. C. data management software. data management software. D. network software. network software.

18  Which of the following best illustrates the relationship between entities and attributes? A. The entity CUSTOMER with the attribute PRODUCT The entity CUSTOMER with the attribute PRODUCT B. The entity CUSTOMER with the attribute ADDRESS The entity CUSTOMER with the attribute ADDRESS C. The entity PRODUCT with the attribute PURCHASE The entity PRODUCT with the attribute PURCHASE D. The entity PRODUCT with the attribute CUSTOMER The entity PRODUCT with the attribute CUSTOMER

19  Software used to apply the computer to a specific task for an end user is called: A. system software. system software. B. application software. application software C. data management software. data management software. D. network software. network software.

20  Software that organizes, manages, and processes business data, such as data concerned with inventory, customers, and vendors, is called: A. system software. system software. B. application software. application software. C. data management software. data management software. D. network software. network software.

21  Legacy systems are still in use today because: A. they can only be run on the older mainframe computers. they can only be run on the older mainframe computers. B. they are too expensive to redesign. they are too expensive to redesign. C. many integrate well using new Web services technologies. many integrate well using new Web services technologies. D. they contain valuable data that would be lost during redesign. they contain valuable data that would be lost during redesign.

22  What would be a reason for using a workstation rather than a personal computer? A. When you need more powerful computational abilities When you need more powerful computational abilities B. When you need to access a network When you need to access a network C. When you need to serve applications and data to client computers When you need to serve applications and data to client computers D. When you need to share resources When you need to share resources

23  Which of the following types of computer would you use to support a computer network? A. Server Server B. Mainframe Mainframe C. Workstation Workstation D. PC PC

24  Which of the following types of computer is used for weather forecasting? A. Mainframe Mainframe B. Server Server C. Minicomputer Minicomputer D. Supercomputer Supercomputer

25  Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called: A. co-location. co-location. B. cloud computing. cloud computing. C. grid computing. grid computing. D. autonomic computing. autonomic computing

26  The use of multiple computers linked by a communications network for processing is called: A. grid computing. grid computing. B. distributed processing. distributed processing. C. client/server computing. client/server computing. D. centralized processing. centralized processing

27  The business case for using grid computing involves all of the following except: A. cost savings. cost savings B. centralized maintenance. centralized maintenance. C. speed of computation. speed of computation. D. agility. agility.

28  In client/server computing, the client is: A. the computer that acts as the user point of entry. the computer that acts as the user point of entry. B. the location of the bulk of the processing. the location of the bulk of the processing. C. software program used for logging on to the network. software program used for logging on to the network. D. the computer that firsts asks for services. the computer that firsts asks for services.

29  A table that links two tables that have a many-to- many relationship is often called a(n): A. derived table. derived table. B. intersection relation. intersection relation. C. foreign table. foreign table. D. entity-relationship table. entity-relationship table.

30  The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A. normalization. normalization. B. data scrubbing. data scrubbing. C. data cleansing. data cleansing. D. data administration. data administration.

31  In a multitiered network: A. the work of the entire network is centralized. the work of the entire network is centralized. B. the work of the entire network is balanced over several levels of servers. the work of the entire network is balanced over several levels of servers. C. processing is split between clients and servers. processing is split between clients and servers. D. processing is handled by multiple, geographically remote clients. processing is handled by multiple, geographically remote clients.

32  A client computer networked to a server computer, with processing split between the two types of machines, is called a ________ architecture. A. service-oriented service-oriented B. on-demand on-demand C. multitiered client/server multitiered client/server D. two-tiered client/server two-tiered client/server

33  The primary storage technologies are: A. storage networks, magnetic tape, magnetic disk, and optical disk. storage networks, magnetic tape, magnetic disk, and optical disk. B. hard drives, magnetic tape, magnetic disk, and optical disk. hard drives, magnetic tape, magnetic disk, and optical disk. C. storage networks, magnetic disks, hard disks, and optical disks. storage networks, magnetic disks, hard disks, and optical disks. D. hard drives, removable drives, storage networks, and magnetic tape. hard drives, removable drives, storage networks, and magnetic tape.

34  Which of the following is a type of optical disk storage? A. CD-ROM CD-ROM B. Hard drive Hard drive C. USB Flash drive USB Flash drive D. Magnetic tape Magnetic tape

35  Which of the following storage technology stores data sequentially? A. CD-ROM CD-ROM B. RAID RAID C. Magnetic disks Magnetic disks D. Magnetic tape Magnetic tape

36  A high-speed network dedicated to storage that connects different kinds of storage devices, such as tape libraries and disk arrays so they can be shared by multiple servers, best describes: A. SSN. SSN. B. ASP. ASP. C. LAN. LAN. D. SAN. SAN.

37  Which of the following devices collects data directly from the environment for input into a computer system? A. Sensor Sensor B. Touch screen Touch screen C. Audio input Audio input D. Trackball Trackball

38 You have no Question as You are an instant winner of “2 Points” And you think - you got it easy!

39 You have no Question as You are an instant winner of “4 Points” WOW, That was close!

40 You have no Question You are an instant WINNER of “6 Points” WAKE ME UP LATER!

41 You are an instant WINNER Select a Team and GIVE them the Gift of Points “8 Points” WOW! What a NICE Team! You get to have another question!

42 Take the points and Relax!

43  Virtualization: A. allows one operating system to manage several physical machines. allows one operating system to manage several physical machines. B. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom. C. can boost server utilization rates to 70% or higher. can boost server utilization rates to 70% or higher. D. allows smartphones to run full-fledged operating systems. allows smartphones to run full-fledged operating systems.

44  Which of the following statements is not true about cloud computing? A. It consists of three types of services: cloud infrastructure, cloud platform, and cloud software. It consists of three types of services: cloud infrastructure, cloud platform, and cloud software. B. It removes the concern about data and systems security for businesses. It removes the concern about data and systems security for businesses C. It allows smaller firms to use resources previously unaffordable. It allows smaller firms to use resources previously unaffordable D. It relies on the Internet as the platform for delivering services to users. It relies on the Internet as the platform for delivering services to users.

45  Purchasing computing power from a central computing service and paying only for the amount of computing power used is commonly referred to as: A. grid computing. grid computing. B. utility computing. utility computing. C. client/server computing. client/server computing. D. autonomic computing. autonomic computing.

46  ________ describes the practices and technologies used minimize the environmental effects of manufacturing and managing computing devices. A. Capacity planning Capacity planning B. Cloud computing Cloud computing C. Green computing Green computing D. Autonomic computing Autonomic computing

47  An example of autonomic computing is: A. virus protection software that runs and updates itself automatically. virus protection software that runs and updates itself automatically. B. software programmed to run on any hardware platform. software programmed to run on any hardware platform. C. cell phones taking on the functions of handheld computers. cell phones taking on the functions of handheld computers. D. programming languages that allow non-programmers to create custom applications. programming languages that allow non-programmers to create custom applications.

48  An industry-wide effort to develop systems that can configure, optimize, tune, and heal themselves when broken, and protect themselves from outside intruders and self-destruction is called: A. grid computing. grid computing. B. utility computing. utility computing. C. cloud computing. cloud computing. D. autonomic computing. autonomic computing.

49  A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because: A. it typically focuses on a single subject area or line of business. it typically focuses on a single subject area or line of business. B. all the information is historical. all the information is historical. C. it uses a Web interface. it uses a Web interface. D. all of the information belongs to a single company. all of the information belongs to a single company.

50  Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business decisions are known as: A. DSS. DSS. B. business intelligence. business intelligence. C. OLAP. OLAP. D. data mining. data mining.

51  The interactive, multiuser operating system developed by Bell Laboratories in 1969 to be highly supportive of communications and networking is: A. UNIX. UNIX. B. Linux. Linux. C. Mac OS. Mac OS. D. COBOL. COBOL

52  Linux is: A. primarily concerned with the tasks of end users. primarily concerned with the tasks of end users. B. designed for specific machines and specific microprocessors. designed for specific machines and specific microprocessors. C. an example of open-source software. an example of open-source software. D. especially useful for processing numeric data. especially useful for processing numeric data.

53  Linux plays a major role in supporting business information systems, and has garnered about ________ of the U.S. server market. A. 10 percent 10 percent B. 25 percent 25 percent C. 50 percent 50 percent D. 80 percent 80 percent

54  The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve their distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution? A. Mashups Mashups B. Extranet Extranet C. Web services Web services D. Cloud computing Cloud computing

55  Apps: A. lower the cost of switching mobile platforms. lower the cost of switching mobile platforms. B. are an example of open-source software. are an example of open-source software. C. tie the user to a particular hardware platform. tie the user to a particular hardware platform. D. require the user to have an online connection. require the user to have an online connection.

56  Microsoft Word is an example of: A. open-source software. open-source software. B. word-processing software. word-processing software. C. software productivity suite. software productivity suite. D. data management software. data management software

57  Linux: A. is a Windows-like operating system. is a Windows-like operating system. B. plays a major role in running Web servers and local area networks. plays a major role in running Web servers and local area networks. C. is the primary OS used in quantum computing. is the primary OS used in quantum computing. D. is designed to support only UNIX computers. is designed to support only UNIX computers.

58  Microsoft Excel is an example of: A. data management software. data management software. B. spreadsheet software. spreadsheet software. C. presentation graphics. presentation graphics D. word processing software. word processing software.

59  Which type of software provides more control over text and graphic placement in the layout of a page than word processing software? A. Desktop publishing software Desktop publishing software B. Spreadsheet software Spreadsheet software C. Graphics software Graphics software D. Presentation software Presentation software

60  Running a Java program on a computer requires: A. a Java Virtual Machine to be installed on the computer. a Java Virtual Machine to be installed on the computer. B. a Java Virtual Machine to be installed on the server hosting the Java applet. a Java Virtual Machine to be installed on the server hosting the Java applet. C. an applet to be downloaded to the user's computer. an applet to be downloaded to the user's computer. D. no extra or specialized software, as Java is platform-independent. no extra or specialized software, as Java is platform-independent.

61  What is the foundation technology for Web services? A. HTML HTML B. XML XML C. SOAP SOAP D. UDDI UDDI

62 YOU RECEIVE NO POINTS I got my eye on you!

63 YOU RECEIVE NO POINTS What do you mean!

64 YOU RECEIVE NO POINTS WAIT! I know the ANSWER!

65 Your Answer is correct! Total Points 10

66 Your Answer is correct! Total Points 15 You Win!

67 Your Answer is correct! Total Points 20 You want on our team!

68 YOU ARE a Winner!!! You Received 25 Points Your Kidding! RIGHT!


Download ppt "A1 B2 C4 A3G3 A8 G6 I3 B1 A6 B4 B3 B6 F8 I6 B7 C1 C2 H7 H4 A5 G7 C6 C7 H2D2 D4G4 D5 F2 D8 D7 E1 F5 E4 E3 H5 E6 I7E7 F1 D6 F4 F3 E2 I5 F6 F7 G1 G2 D3 C5G5."

Similar presentations


Ads by Google