Question: 1. Jacob, a data analyst, is working on a project from home and needs to download some data from his office network. Which of the
1. Jacob, a data analyst, is working on a project from home and needs to download some data from his office network. Which of the following server platforms will best serve Jacob's purpose? a. Remote access servers b. Web servers c. Application servers d. Disk servers 2. Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment. a. e-cash b. a nanopayment card c. c. e-pay d. a micropayment card 3. Wytes Pharmaceuticals wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company needs a cloud computing option that would offer the highest cost savings and would require the least amount of involvement by IT managers. Which of the following cloud computing options would be the most suitable for Wytes Pharmaceuticals? a. A private cloud b. A public cloud c. A hybrid cloud d. A community cloud 4. Which of the following is a difference between a logistics information system (LIS) and a financial information system(FIS)? a. An LIS supports decisions related to space utilization, whereas an FIS supports decisions related to scheduling and assigning employees. b. An LIS supports decisions related to monitoring cost trends, whereas an FIS supports decisions related to product cost calculations. c. An LIS supports decisions related to improving budget allocation, whereas an FIS supports decisions related to allocating human and financial resources. d. An LIS supports decisions related to improving shipment planning, whereas an FIS supports decisions related to determining portfolio structures. 5. BuyStore Inc., an online retail store, sells all of its products through its Web site, buystore.com, and through an application on cell phones. BuyStore Inc. is an example of a ______. a. brick-and-mortar firm b. pure-play company c. third-party broker d. physical storefront 6. _____ are software capable of reasoning and following rule-based processes. a. Case-based reasoning systems b. Intelligent agents c. Enterprise resource planning systems d. Quick Response codes 7. In the context of intellectual property, which of the following is categorized as industrial property? a. Copyrights b. Artistic works c. Literary works d. Trademarks 8. A _____ is a journal or newsletter that is updated frequently and intended for the general public. a. a. wiki b. tweet c. blog d. podcast 9. A(n) _____ is a type of server that stores computer software, which users can access from their workstations. a. database server b. Web server c. c. application server d. file server 10. A _____ is an input device for computers. a. Mouse b. printer c. monitor d. speaker 11. _____ is a programming language used for controlling robots. a. a. Extensible Markup Language b. Variable Assembly Language c. Maya Embedded Language d. Digital Command Language 12. Which of the following biometric security measures compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities? a. Hand geometry b. Fingerprint recognition c. Vein analysis d. Palm prints 13. In the context of the types of decision-making analyses, the _____ is used in decision support systems. a. case-based analysis b. what-is analysis c. what-if analysis d. rule-based analysis 14. _____ use computer and communication technologies to formulate, process, and implement a decision-making task and can be considered a kind of intervention technology that helps overcome the limitations of team interactions. a. Database management systems b. Group support systems c. Employee monitoring systems d. Geographic information systems 15. _____ is an example of a secondary memory device. a. An inkjet printer b. An optical disc c. Random access memory d. Read-only memory 16. _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission. a. Trademark b. Invention c. Patent d. Copyright 17. The _____ dimension of big data refers to the sheer quantity of transactions, measured in petabytes or exabytes. a. Velocity b. volume c. area d. time 18. A(n) _____ is an input device used to grade multiple-choice and true/false tests. a. optical character reader b. magnetic character sensor c. magnetic ink character recognition system d. optical mark recognition system 19. A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database. a. data-driven Web site b. flat Web page c. stationary Web page d. static Web site 20. _____ refers to widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals. a. Context aware computing b. Cloud computing c. Ubiquitous computing d. Pervasive response computing 21. The embedded references in hypermedia documents are called _____. a. hypertext b. wikis c. podcast d. weblogs 22. _____ refers to building and integrating analytics capabilities into all everyday business activities. a. Pervasive analytics b. Artificial intelligence c. Business analytics d. Business intelligence 23. In the context of Web marketing, the term _____ refers to one user viewing one ad. a. ad blocker b. ad exchange c. ad impression d. ad connect 24. Diverse regulatory practices _____ the integration process of a global information system (GIS). a. Impede b. facilitate c. empower d. speed up