Question: QUESTION 30 The connection between a VPN client and a VPN server is called ________. hyperlink data highway bridge tunnel QUESTION 31 Use of Social
QUESTION 30
The connection between a VPN client and a VPN server is called ________.
| hyperlink | ||
| data highway | ||
| bridge | ||
| tunnel |
QUESTION 31
Use of Social Media systems at work have the following risks (choose 3)
| Decreased productivity because of time spent on Facebook, Twitter etc during working hous | ||
| Sexual harassment liability | ||
| Increased productivity though collaboration, knowledge sharing, problem solving and decision making | ||
| Leaking or stealing of confidential information |
QUESTION 32
Virtualization is the process by which:
| a single operating system is shared by multiple users.
| ||
| One physical computer hosts many different virtual computers within it
| ||
| many computers are used to control a server
| ||
| a single server is used to host the operations of a workstation
|
QUESTION 33
An example of volatile memory is:
| The Random Access Memory (RAM) that is used for the cache in your laptop | ||
| The solid state storage (SSD) in your laptop | ||
| Thumb drives | ||
| CD or DVD |
QUESTION 34
Disadvantages of using open source software include (select two):
| Maintenance and upgrades may be irregular and not supported | ||
| Cheap | ||
| Expensive | ||
| Software may not be stable |
QUESTION 35
Which are examples of storage hardware devices (select two)?
| thumb drive | ||
| optical disk | ||
| barcode scanner | ||
| central processing unit |
QUESTION 36
Choose two facts that are true about Information Technology (IT) and Information Systems (IS). Select two answers:
| IT = hardware + software + data | ||
| IS = hardware + software + data | ||
| IS = IT + procedures + people | ||
| IS can be purchased in multiple currencies |
QUESTION 37
Which of the following is a characteristic of volatile memory?
| Processor heats up during the operation.
| ||
| Contents are lost when power is off | ||
| Processing of data is very slow | ||
| Files are stored permanently | ||
| Has to be cleaned annually |
QUESTION 38
Which of the following would be the most disruptive to an organization when implementing an information system?
| creating new databases
| ||
| installing new software
| ||
| changing reporting relationships and tasks for team members
| ||
| installing new hardware components
|
QUESTION 39
According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes (select two)?
| a used car dealership in Dallas | ||
| a food vendor at a county fair | ||
| an airline that uses most of the gates at Dallas Love Field | ||
| a firm that makes the only drug for a disease
| ||
| a convenience store that sells retail products |
QUESTION 40
The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use
| incremental | ||
| programmatic | ||
| elastic | ||
| portable |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
