Every computer on the Internet has a(n) __________ address.
Question 1 options:
Which of the following statements is true for programming languages?
Question 2 options:
Compilers translate high-level language programs into machine language programs.
Interpreter programs use assembly language as input.
Interpreted programs run faster than compiled programs.
None of the above.
Question 3 options:
A __________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally without the owner's permission and often without the owner's knowledge.
Question 4 options:
The term "open source" means that the source code of the program is __________.
Question 5 options:
less stable and platform dependent
available to the public
available exclusively through licensing
available only to carefully vetted contractors
Which of the following are examples of information systems?
Question 6 options:
College registration system
All of the above
Cloud resources are __________ because many different organizations use the same physical hardware.
Question 7 options:
An MIS does not help managers to gain:
Question 8 options:
none of the above.
Which of the following is the presentation format of an application?
Question 9 options:
Scientific tools used to manipulate information to help choose the best of several possibilities is:
Question 10 options:
decision support systems.
transaction processing systems.
Which of the following is the largest unit of measurement?
Question 11 options:
Which of the following conditions exist when data are isolated in separated information systems?
Question 12 options:
What is source code?
Question 13 options:
An open source framework
File(s) containing statements that provide program instructions
A program that produces machine code
The object code
A login password should not include __________.
Question 14 options:
personal information, such as birthdays
more than 8 characters
Mark is transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
Question 15 options:
The suite of communications protocols used in the Internet is called:
Question 16 options:
none of the above.
__________ is the activity of altering existing and designing new business processes to take advantage of new information systems.
Question 17 options:
Business process outsourcing
Business process modeling
Business process reengineering
Enterprise resource planning
The physical components of a computer are referred to as __________.
Question 18 options:
A(n) __________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Question 19 options:
access control system
intrusion detection system
A relational DBMS allows you to create database structures containing __________.
Question 20 options:
all of the above