1 Review Exercise BUS3500 - Abdou Illia, Fall 2006 This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final, students need to study according to the Review For Final Guide document available in the Review section of the course web site
21
Embed
1 Review Exercise BUS3500 - Abdou Illia, Fall 2006 This exercise covers some of the kind of questions students could expect in the final examination. To.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Review Exercise
BUS3500 - Abdou Illia, Fall 2006
This exercise covers some of the kind of questions students could expect in the final examination. To be prepared for the final,
students need to study according to the Review For Final Guide document available in the
Review section of the course web site
2
Computer Hardware Technologies
Which of the following could be used as an input device as well as an output device?
a) Stylusb) Monitorc) Printerd) Hard diske) Floppy diskf) Magnetic Ink Character Recognition (MICR) readerg) Random access memoryh) Read only memory
3
Computer Hardware Technologies
How many bits are there in a byte?a) About 1000b) 8c) About 1000000d) None of the above
What is the difference between pixel and dot pitch?
4
Computer Hardware Technologies
Which of the following is true about the instruction control unit?
a) It generates the time that synchronizes other components
b) It stores control information, data, intermediate results
c) It fetches instructions from RAM during program execution
d) None of the above
5
Software technologies Which of the following is not a type of
systems software?a) Spreadsheet programb) Internet Explorerc) Language translatord) Utility program
What is meant by multiprogramming and multitasking?
6
Software technologies Which of the following is true about
systems software and application software?
a) Systems software allow users to accomplish specific tasks
b) Application software are responsible for starting the computer and providing user interface
c) All of the aboved) Neither a nor b
7
Network technologies
Which of the following is not considered a type of protocol?
a) TCP/IPb) Client/serverc) Topologyd) Ethernet
8
Network technologies
In which of the following type of network, collisions could not occur?
a) Ethernetb) Token ringc) Wide area networkd) None of the above
What is a node?
9
Network technologies
Which of the following types of switching technique is, traditionally, used in voice networks?
a) Packet switchingb) Circuit switchingc) Virtual switchingd) None of the above
10
Network technologies
What type of transmission media are usually used for standard telephone line?
a) Fiber optic cableb) Coaxial cablec) Twisted pair cabled) None of the above
What do 10Base2 and 100BaseTX refer to?
11
Managing Dev. & Purchase of IS
In this type of system implementation, a company installs the new system at only one location or one department?
a) Direct cutoverb) Parallel conversionc) Staged conversiond) Pilot Testinge) None of the above
12
Managing Dev. & Purchase of IS
In which of the following types of testing the new system is run in a simulated environment with simulated data?
a) Stub testingb) Validation testingc) Unit testingd) Verification testing
13
Managing securityFirewalls could be used to protect a network against tear drop attacks
T F
Ping of death is a kind of DoS attack T F
A cracker is an intruder who breaks into a system in order to learn about it
T F
Security education programs are not key components of Information Security Plans
T F
You could become a victim of content attacks while navigating the web
T F
14
15
Central Processing Unit
Clock: generates time that synchronizes other components