Question: Which of the following statements is true of closed source projects?

Answer Options:

Only users are allowed to alter the source code.
Only trusted programmers are allowed to make changes.
Only the programmers who hold the license are allowed to alter the source code.
Only the license holder is allowed to alter the source code.

Answer: Only the license holder is allowed to alter the source code.

 

Question: An accountant realizes that considerable amount of time that is wasted when accounting tasks are performed manually. The software that automates these tasks is called ________.

Answer Options:

Operating system
System software
Firmware
Application software

Answer: Application software

 

Question: Which of the following is an example of vertical-market application software? (select all that apply)

Answer Options:

Inventory tracking software for an automobile manufacturer
Tax preparation software that individuals use in their personal computers
Microsoft PowerPoint used to create presentations
Self-driving software of an automobile manufacturer

Answer: Inventory tracking software for an automobile manufacturer Self-driving software of an automobile manufacturer

 

Question: Smart devices will increasingly need ________. (select all that apply)

Answer Options:

New protocols
Less cache
Higher bandwidth
Less memory

Answer: Higher bandwidth

 

Question: Bits are used for computer data because they ________.

Answer Options:

Are represented exclusively as alphabets
Can have three possible states at a time
Are easy to represent physically
Are more complex than bytes

Answer: Are easy to represent physically

 

Question: Main memory is also known as ________.

Answer Options:

Optical memory
Read-only memory
Cache memory
Random access memory

Answer: Random access memory

 

Question: Which of the following is an example of SaaS?

Answer Options:

iCloud
Oracle on Demand
Amazon S3
Microsoft Windows Azure

Answer: iCloud

 

Question: Which of the following refers to the three tiers in the three-tier architecture?

Answer Options:

TCP, IP, and HTTP
Tunnel, switch, and access point
HTML, XML, and JSON
User, server, and database

Answer: User, server, and database

 

Question: Mark follows certain steps to access the supplementary readings for a course when using his organization’s library management system. These steps that he follows are examples of the ________ component of an information system.

Answer Options:

User guide
Procedure
Instructions
Software

Answer: Procedure

 

Question: Which of the following is the least critical aspect of good information?

Answer Options:

Additional data
Timeliness of data
Relevance of data
Data accuracy

Answer: Additional data

 

Question: Virtualization is the process by which ________.

Answer Options:

One physical computer hosts many different virtual computers within it
Many computers are used to control a server
A single server is used to host the operations of a workstation
A single operating system is licensed for multiple computers

Answer: One physical computer hosts many different virtual computers within it

 

Question: A client-server application that requires nothing more than a browser is called a(n) ________.

Answer Options:

Native application
Website
Thick-client application
Thin-client application

Answer: Thin-client application

 

Question: People with common interests create social networks or social relationships using ________.

Answer Options:

Social media clouds
Social media sponsors
Social media protocols
Social media application providers

Answer: Social media application providers

 

Question: Carol completed her PhD and posted her achievement on Facebook. Her friends left congratulatory messages. Carol’s and her friends’ posts are an example of ________.

Answer Options:

Secondary data
Connection data
Content data
Social capital data

Answer: Content data

 

Question: Social CRM is a/an ________ process.

Answer Options:

Uncontrolled but structured
Unstructured but controlled
Unstructured and uncontrolled
Structured and controlled

Answer: Unstructured and uncontrolled

 

Question: Marco posted a negative product review on Facebook. His friends added their own negative comments about the same product. The risk faced by the manufacturer of this product is ________.

Answer Options:

Loss of credibility
Loss of visibility
Loss of control
Loss of investment

Answer: Loss of control

 

Question: A smartwatch company is asking Facebook users to suggest new features for its product. These features will be incorporated into the upcoming product. This company is practicing ________.

Answer Options:

Crowdsourcing
Socialsourcing
Outsourcing
Freesourcing

Answer: Crowdsourcing

 

Question: A company displays its ads for free on a number of websites. But it pays the websites $0.30 every time someone clicks on the ad. This model is called ________.

Answer Options:

Premium
Pay-per-click
Freemium
Click-and-pay

Answer: Pay-per-click