QUESTION
Question-1
You want to model the growth
of the sales of three different products over the past six years. You want to
emphasize the growth of the total amount of sales in addition to the relative
growth rates of each of the products. Which type of chart should you use?
·
Clustered column chart
·
Stacked column chart
·
100% stacked column chart
·
Pie chart
Question-2
What is the best strategy for
designing a PowerPoint presentation for the first time for your organization?
·
Choose the template that you used for the class
that you did the best in at college.
·
Use the Microsoft.com 5-star rating to find the
most well-liked template.
·
Ask around to see if there
is a standard template for the organization.
·
Use the Blank Presentation template just to be safe.
Question-3
Nonmerchant companies
·
sell services that they provide
·
include B2C, B2B, and B2G transactions
·
take title to the goods they sell
·
arrange for the purchase
and sale of goods
Question-4
Which of the following is
considered to be input hardware?
·
Video Display
·
Plotter
·
Speakers
·
Keyboard
Question-5
A ________ connects computers
at different geographic locations.
·
PSDN
·
LAN
·
VPN
·
WAN
Question-6
Which of the following
statements is TRUE with regard to system maintenance?
·
All commercial software
products are shipped with known failures.
·
All organizations track system failures and
enhancements using word-processing documents.
·
Software developers usually club enhancement
requests and failures together.
·
IS personnel prioritize system problems on a
first-come-first-served basis
Question-7
When creating a presentation,
it is most important to consider making the text
·
readable
·
colorful
·
decorative
·
beautiful
Question-8
The CPU has a small amount of
very fast memory called
·
a cache
·
the main memory
·
a data channel
·
serial bus
Question-9
On a spreadsheet you have
just opened, the projected sales are listed by departments. You have just
summed up the projected sales by each department for year 2009 using a SUMIF
function. To copy the same formulas over to use for year 2010, what types of
referencing should you use?
·
Use absolute referencing
to refer to the column containing department names, but relative referencing
for the rest.
·
Use relative referencing to refer to the column
containing department names, but mixed referencing for the rest.
·
Use relative referencing to refer to the column
containing department names, but relative referencing for the rest.
·
Use absolute referencing to refer to the column containing
department names, but mixed referencing for the rest.
Question-10
In the Web 2.0 world, the
value of a site increases
·
with users and use
·
over time
·
as the investments in it increase
·
exponentially
Question-11
A grocery scanning checkout
system is an example of
·
a vertical-market software
·
a one-of-a-kind application
·
an operating system
·
a horizontal market software
Question-12
Which of the following is
true of VPN?
·
Remote access is difficult in case of VPN.
·
One disadvantage of VPN is that it does not
encrypt messages.
·
It is a virtual, private pathway over a public
or shared network from the client to the server.
·
VPN communications are
secure even though they are transmitted over the public Internet.
Question-13
tracks changes to documents
and provides features and functions to accommodate concurrent work.
·
Workspace management
·
Content regulation
·
Workflow regulation
·
Version management
Question-14
Projects that spend so much
time ________ are sometimes said to be in analysis paralysis.
·
on project scheduling
·
documenting requirements
·
in the system definition phase of the SDLC
·
designing system components
Question-15
The easiest and cheapest time
to alter the information system is in the ________ phase of the SDLC.
·
implementation
·
requirements analysis
·
component design
·
system definition
Question-16
In making a financial plan,
you have decided to assume sales will grow by 10% from this yearâs sales. The
information for this yearâs sales is contained in cell B5. The correct formula
you should type into a cell to calculate next yearâs sales is
·
=B5+B5*0.1
·
=1+B5*0.1
·
=10%*B5
·
=0.1*B5
Question-17
To locate something in the
database, one must type in the keyword into the ________ of the application.
·
data column
·
report
·
query form
·
data entry form
Question-18
The broadest definition of
________ includes viruses, worms, Trojan horses, spyware, and adware.
·
software
·
malware
·
metadata
·
widgets
Question-19
Mark recently received an
e-mail from what appeared to be a legitimate company, asking him to update and
verify his credit card details. Unknowingly, he obliged and later realized that
the information had been misused. Mark is a victim of
·
sniffing
·
phishing
·
hacking
·
pretexting
Question-20
Most homes and small
businesses use ________ because they receive more data than they transmit.
·
ISDN
·
SDSL
·
ADSL
·
PPP
Question-21
If you were writing a report
and wanted the bottom of the third pageâafter the title page and the table of
contentsâto say Page 1, what would you need to insert?
·
A section break
·
A header
·
A delimiter
·
A table
Question-22
Which of the following is
true regarding an incident-response plan?
·
The plan should identify
critical personnel and their off-hours contact information.
·
The plan should be simple enough to ensure a
fast response with limited practice.
·
The plan should require minimal training on the
part of employees.
·
The plan should provide decentralized reporting of all security
incidents.
Question-23
The best way to apply a previously
created style to the current document is to
·
click on the style; then select each line you
want changed
·
select all paragraphs you
want changed and click on the style
·
click on the style; then select all paragraphs
you want changed
·
select each line you want changed and click on the style
Question-24
Which of the following is
true of Web 2.0?
·
Its supporting technologies include HTTP and
HTML.
·
It is supported by telephones, faxes, and EDIs.
·
It makes use of
user-generated content and is flexible.
·
It is a primitive interorganizational information system
Question-25
During the ________ phase of
the SDLC process, developers construct, test, and install the components of the
information system.
·
database design
·
requirements analysis
·
feasibility assessment
·
implementation
Question-26
Which of the following systems
for sharing content provides version control?
·
Google Docs
·
Microsoft SharePoint
·
Windows Live SkyDrive
·
File Transfer Protocol
Question-27
Which of the following is
TRUE of in-house custom-developed software?
·
The developing company
pays the adaptation costs itself.
·
The organization has to tailor its applications
to the software.
·
They are less expensive than off-the-shelf
software.
·
They are easy and comparatively cheap to make
Question-28
Which of the following stands
true for enterprise DBMS products?
·
Paradox is an example of an enterprise DBMS
product.
·
Most of the enterprise DBMS products are out of
business today.
·
Enterprise DBMS products are designed for small
and simple database applications.
·
Enterprise DBMS products
support manyâperhaps thousandsâof users and many different database applications
Question-29
Which of the following
statements is true regarding position sensitivity?
·
It enables security
personnel to prioritize their activities in accordance with the possible risk
and loss.
·
It applies to new employees only.
·
It is documented only for high-sensitivity
positions.
·
It is a type of data safeguard.
Question-30
Which of the following is
TRUE of thick-client applications?
·
All other things being equal, thin-client applications are
preferred over thick-client applications.
·
With a thick-client
application, a system administrator must install the new version on each user
computer.
·
A thick-client application is an application
program that need not be preinstalled on the client.
·
A thick-client application does not require preinstallation of
client codes.
ANSWER:
Place an order in 3 easy steps. Takes less than 5 mins.