Você está na página 1de 14

GIRNE AMERICAN UNIVERSITY

FACULTY OF BUSINESS AND ECONOMICS


MANAGEMENT INFORMATION SYSTEMS DEPARTMENT

BUS306 Management Information Systems


Summer 2014
Final Examination

August 15, 2014 Duration: 60 minutes


Lecturer: Asst. Prof. Dr. Yasemin Fanaeian
Name

Student No

Surname

Group No

General Remarks:
1. This is a closed book exam.
2. Attempt ALL questions.
3. Make sure you have 7 different pages including this page.
4. All work to be done in the spaces provided on the exam paper.
5. No books, notes and dictionaries are allowed.
6. Mobile phones are not allowed. All mobile phones should be switched
off during the exam.
Marks
Total (50 pts)
Good Luck..

1. What is phishing?
a. An investigative Web service
b. A type of Internet game that allows subscribers to find out information
about you and others living in its "virtual city"
c. Information bots that surf the Web for you searching for specific
information that you need
d. Email and other online techniques that attempt to gain personal
information from you
2. What is unsolicited email from businesses that advertise goods and
services?
a. Computer viruses

3.

4.

5.

6.

b. Spam
c. Cookies
d. Sneakware
What is the difference between spam and phishing?
a. Spam is sent via email; phishing is not
b. Phishing is about pornography; spam is not
c. Phishing attempts to get your personal information; spam does not
d. There is virtually no difference between spam and phishing
What technology hides your identity from the Web sites you visit?
a. AntiHacking
b. Private Agent Surfing Services (PASS)
c. Stealthware
d. Anonymous Web browsing (AWB)
If part of your academic work was to read the Wall Street Journal's
articles on information technology and these articles were automatically
delivered to your account, what type of technology would you be using?
a. M-commerce
b. Internet search and deploy
c. Push
d. Pull
Which of the following systems development techniques allows end
users to develop business applications?
a. Outsourcing
b. Insourcing

c. Netsourcing
d. Selfsourcing
7. The SDLC contains 7 phases. Which phase is devoted to creating a solid
plan for developing your information system?
a. Initiation
b. Planning
c. Design
d. Analysis
8. The SDLC contains 7 phases. Which phase verifies that the system works
and meets all the business requirements developed in an earlier phase?
a. Development
b. Transformation
c. Implementation
d. Testing
9. The SDLC contains 7 phases. Which phase monitors and supports the
new system to ensure it continues to meet your business goals?
a. Implementation
b. Testing
c. Maintenance
d. Operations

10.Which of the following occurs when the scope of the project increases
beyond its original intentions?
a. Scope creep
b. Feature creep
c. Milestone
d. Rolling stone
11.In what phase of the SDLC is the technical architecture for the proposed
system defined?
a. Planning
b. Design
c. Analysis
d. Development
12.Which of the following is not an advantage to prototyping?
a. Prototyping encourages active user participation
b. Prototyping helps resolve discrepancies among users
c. Prototyping gives users the final system
d. Prototyping helps determine technical feasibility
13.What option is available to you with outsourcing?
a. Purchase existing software
b. Purchase existing software and requiring modifications to it
c. Contracting for the development of a new information system
d. You can outsource each of these options
14.What is a formal document that describes in detail your logical
requirements for a proposed system and invites vendors to submit bids
for its development?

a. Requirements document
b. Design specification
c. Request for proposal (RFP)
d. Project scope document
15.If you were concerned about how a person would feel because of
something you did, you would be experiencing what type of influencing
circumstance?
a. Consequences
b. Likelihood of effect
c. Relatedness
d. Reach of result
16.Which of the following is the unauthorized use, duplication, distribution,
or sale of copyrighted software?
a. Pirated software
b. Spam
c. Phishing
d. Sneakware
17.What is the right to be left alone when you want to be, to have control
over your own personal possessions, and not to be observed without
your consent?
a. Ethics
b. Personal safety laws
c. Identity theft laws
d. Privacy
18.What program records every keystroke and mouse click executed on a
computer?
a. Keyboard recorder

b.
c.
d.
19.What
a.

Trojan horse
Virus
Key logger
is identity theft?
When a person losses that sense of self because of their heightened
activities on the Web
b. When a person, or group of people, take on another person's identify and
then send email and other online communications under the fraudulent
name
c. When one person changes their features and dress to resemble another
person
d. When a person, or group of people, forge someone's identity for the
purpose of fraud

20.What is a computer virus?


a. Software that is written with malicious intent to cause annoyance or
damage
b. Software that hides your identity from Web sites you visit
c. Utilities that hide themselves from the operating system and monitor the
software you have
d. Applications that record activities and site information regarding your
surfing sessions
21.What software should you install to protect your computer from
computer viruses?
a. Spyware
b. Adware
c. Worms
d. Anti-virus
22.What type of access authentication system uses your physical
characteristics to determine if you should, or should not, have access to
a computer system?
a. Behaviometrics

b. Human system recognition


c. Biometrics
d. Physiological systems
23.If you were traveling abroad and needed to use some software that you
did not currently have, and did not want to purchase, what type of
software could you rent during this trip?
a. Leasing Online Software and Services (LOSS)
b. Software-as-a-Service (SaaS)
c. Electronic Rental Software (eRent)
d. Application Service Provider (ASP)
24.What type of Internet company provides pay-per-use software?
a. Software leasing
b. Software developers
c. Software-as-a-service (Saas)
d. Application service provider (ASP)
25.What Web environment features online collaboration, dynamic and
customized feeds, and greater control of Web content by users?
a. Wiki
b. Web 2.0
c. CAVE
d. Social networking
26.Which term is used for a three-dimensional computer simulation in which
you actively and physically participate?
a. 3-D Modeling
b. Multi-state blending

c. Virtual Reality
d. Holosuite
27.What type of equipment can be used in a virtual reality environment?
a. Glove
b. Glove and Headset
c. Walker
d. Glove, Headset, and Walker
28.What type of technology enhances your experiences with computer
applications by adding a sense of touch to the environment?
a. Biometrics
b. Crowdsourcing
c. Haptic interface
d. CAVEs
29.An ATM card is an example of which form of biometric security?
a. What you know
b. What you have
c. Who you are
d. What you can do
30.Fingerprints are an example of which form of biometric security?
a. What you know

b. Who you are


c. What you have
d. What you can do
31.If you were working in your kitchen and wanted to send information
from the laptop computer that you were currently working on to your
desktop computer located in the study, what wireless device would you
need?
a. RFID
b. Bluetooth
c. WiFi or Bluetooth
d. Microwave
32.What technology are many organizations implementing to streamline
supply chain management activities?
a. RFID
b. Biometrics
c. RFPC
d. Haptic interface
33.What are devices that create, capture, and/or display images in true
three-dimensional form?
a. Holographic device
b. CAVE
c. Portability
d. Mobility
34.Which of the following can be used to help identify people in a crowd?
a. Biochip
b. Implant chip

10

c. Facial recognition software


d. Vision chip
35.What is the term used to show the great differences between those who
have technology and those who do not?
a. Web barrier
b. Digital divide
c. Technological disadvantaged
d. Information Poor
36.Despite the advantages of technology, which of the following is
sacrificed in exchange for convenience?
a. Money
b. Privacy
c. Technology
d. Paper
37.What uses a microchip in a product label to store information that is
transmitted by a reader using radio waves?
a. Radio Frequency identification
b. Implant chips
c. Biochip
d. UPC
38. What is the waterfall methodology?
a. A sequential, activity based SDLC
b. An assessment methodology that ensures quality applications
c. An outsource development methodology to information systems

11

d. A process management technique that identifies and includes end users


and management in the SDLC

39.The SDLC contains 7 phases. Which phase distributes the system to all
the users so that they can use it to perform their jobs?
a. Implementation
b. Testing
c. Maintenance
d. Expansion
40.What is a common test that is performed to ensure the quality of the
information system you are building?
a. Unit and system testing
b. User acceptance testing
c. Integration testing
d. Unit, system, Integration, and user acceptance testing
41.If you were to allow only a select group of people to use the new system
so that you could determine if it was working correctly, what type of
implementation method would you be following?
a. Pilot implementation
b. Parallel implementation
c. Plunge implementation

12

d. Phase implementation
42.What is a process of building a model that demonstrates the features of
a proposed product, service, or system?
a. RAD
b. XP
c. Prototyping
d. Modeling
43.Which infrastructure-centric metric measures the error rate or the
number of errors per thousand (or million) that an information system
generates?
a. Accuracy
b. Throughput
c. Scalability
d. Critical success factor
44.
Which call center metric determines the percentage of callers who
hang up while waiting for their call to be answered?
a. Abandon rate
b. Lost calls
c. Missed rate
d. Failure to answer rate (FAR)
45.If you were trying to access your campus network but the system was
unable to respond to you because it was overwhelmed with a flood of
requests coming from some virus, what type of attack would you be
experiencing?
a. Worms
b. Script kiddies
c. Denial-of-service
d. Cyber blackmail

13

46.What is a CAVE?
a. A simulation device used to train and instruct special forcers in the
climbing, firefighting, and search and rescue industry
b. A three-dimensional computer simulation in which you can actively and
physically participate
c. A virtual reality room that can display images and other people from other
CAVEs
d. An advanced and secured communication system used for extremely
sensitive data

47. What type of IT infrastructure involves sharing information systems in


one central area or mainframe?
a. Client/server
b. Decentralized
c. Centralized
d. Distributed
48.In what type of tiered infrastructure do all the computing resources sit
on one computer?
a. 1-tier
b. 2-tier
c. 3-tier
d. 4-tier
49.What is the process of continuously measuring system results and
comparing those results to values a system seeks to attain?
a. Critical milestones
b. Benchmarking
c. Quality testing
d. Criterion checking
50.In which phase does the project team move from the physical design to
the physical implementation?
a. Implementation
b. Testing
c. Development
d. Transformation

14

Você também pode gostar