Test Bank for Managing Information Technology 7th Edition by Brown, DeHayes, Slater

$25.00

Category:

Description

INSTANT DOWNLOAD COMPLETE TEST BANK WITH ANSWERS

 

Test Bank For Managing Information Technology 7th Edition by Brown, DeHayes, Slater

 

Sample  Questions

 

Managing Information Technology, 7e (Brown)

Chapter 3   Telecommunications and Networking

 

1) Which of the following is a (are) primary reason(s) for networking an organization’s computers together?

  1. A) sharing of peripherals such as printers
  2. B) sharing of data
  3. C) enables client/server applications
  4. D) all of the above

Answer:  D

Page Ref: 61-62

 

2) Which of the following is not a primary function performed by a telecommunications network?

  1. A) transmission of voice
  2. B) archiving data
  3. C) tracking of out-of-service devices
  4. D) transmission of data

Answer:  B

Page Ref: 63

 

3) Which of the following most accurately describes the conversion function of telecommunications?

  1. A) checking for errors and putting the communication into a standardized format
  2. B) changing coding system or speed when moving data between devices on the network
  3. C) keeping track of the status of the network
  4. D) choosing the most efficient path for a message to be sent over the Internet

Answer:  B

Page Ref: 63

 

4) Which of the following most accurately describes the routing function of telecommunications?

  1. A) checking for errors and putting the communication into a standardized format
  2. B) changing coding system or speed when moving data between devices on the network
  3. C) keeping track of the status of the network
  4. D) choosing the most efficient path for a message to be sent over the Internet

Answer:  D

Page Ref: 63

 

5) Which of the following is a term used to describe transmission speed of a network?

  1. A) parity
  2. B) baud
  3. C) MIPS
  4. D) phase

Answer:  B

Page Ref: 64

6) When data can be transmitted in both directions on a telecommunications line, but not simultaneously, the transmission type is referred to as:

  1. A) switched-line.
  2. B) simplex.
  3. C) half-duplex.
  4. D) full-duplex.

Answer:  C

Page Ref: 65

 

7) What is a key characteristic of a dedicated line versus a switched line?

  1. A) requires fiber optic media
  2. B) used only for transactions within a single building
  3. C) provides a direct transmission between sender and receiver
  4. D) all of the above

Answer:  C

Page Ref: 65

 

8) A common transmission medium that consists of a heavy copper wire at the center, surrounded by insulating material, then a cylindrical conductor, and finally an outer protective plastic covering is called a:

  1. A) fiber-optic cable.
  2. B) coaxial cable.
  3. C) twisted pair of wires.
  4. D) token ring.

Answer:  B

Page Ref: 66

 

9) Which statement about Wi-Fi is not true?

  1. A) Wi-Fi is a wireless technology for local area networks.
  2. B) Wi-Fi is used in buildings with wired LANs to enable mobile access to the organizational networks.
  3. C) Wi-Fi networks are replacing WiMAX networks due to their greater speed and geographic coverage.
  4. D) Wi-Fi networks use a CSMA/CA protocol to avoid message failures.

Answer:  C

Page Ref: 74-75

 

10) Which of the following is not an advantage of a wireless LAN versus a wired LAN?

  1. A) faster transmission speed and more secure
  2. B) takes planning, but relatively easy to install
  3. C) enables users of mobile devices to connect to a LAN
  4. D) can be used as an overlay network to permit employees to connect their laptops to the corporate network from anywhere in the building

Answer:  A

Page Ref: 67, 74-75

 

11) Which transmission medium requires an unobstructed straight line between the transmitter and the receiver?

  1. A) coaxial cable
  2. B) twisted pair of wires
  3. C) microwave
  4. D) wireless (as in a LAN)

Answer:  C

Page Ref: 68

 

12) Which of the following is not a characteristic of fiber-optic transmission?

  1. A) faster transmission than twisted pair of wires
  2. B) more secure than other media because it does not emit radiation
  3. C) requires more space than coaxial cable because it has more insulation
  4. D) not affected by power-line surges or electromagnetic interference

Answer:  C

Page Ref: 70

 

13) Which of the following is not a characteristic of a star network topology?

  1. A) costly for small and medium-sized networks
  2. B) relatively easy to identify which cable has failed
  3. C) if central device fails, whole network fails
  4. D) easy to add additional devices

Answer:  A

Page Ref: 71

 

14) Which type of file requires the greatest bandwidth?

  1. A) a Word document page in small font
  2. B) a complex graphic
  3. C) one minute of a voice conversation
  4. D) one minute of a video

Answer:  D

Page Ref: 65

 

15) Which type of technology relies on line-of-sight transmission?

  1. A) Bluetooth
  2. B) satellite
  3. C) WiMAX
  4. D) WiFi

Answer:  B

Page Ref: 68-69

 

 

16) Which statement about active RFID tags is not true?

  1. A) They are much more commonly used today than passive tags.
  2. B) They can transmit information continuously, on request, or on a predetermined schedule.
  3. C) They have their own power supply.
  4. D) They are more expensive than passive tags.

Answer:  A

Page Ref: 67

17) Which company was the most visible early adopter of using RFID for inventory management?

  1. A) Cisco Systems
  2. B) Microsoft
  3. C) Walmart
  4. D) Facebook

Answer:  C

Page Ref: 67

 

18) Which statement about Bluetooth is not true?

  1. A) It is named after a Viking queen.
  2. B) It is short-range radio technology built into a microchip.
  3. C) It enables cellular communication with home appliances as well as permitting wireless communication between a computer and a mouse, keyboard, and printer.
  4. D) Bluetooth technology standards are available free of royalties to any company that wishes to use them.

Answer:  A

Page Ref: 68

 

19) The term Ethernet is often used as a synonym with which of the following types of local area networks:

  1. A) token bus network.
  2. B) token ring network.
  3. C) contention bus network.
  4. D) contention ring network.

Answer:  C

Page Ref: 73

 

20) Which statement describes a major difference between a LAN and a WAN?

  1. A) usage by a corporation
  2. B) geographic distance between devices being networked
  3. C) usage of wireless media
  4. D) all of the above

Answer:  D

Page Ref: 72-73, 77-80

 

 

21) The CSMA/CD and CSMA/CA protocols are designed to manage which of the following:

  1. A) low bandwidth.
  2. B) conversion of data from digital to analog.
  3. C) message collisions.
  4. D) passing of token from one device to another.

Answer:  C

Page Ref: 73-75

 

22) A private, packet-switched network using the public Internet is referred to as a(n):

  1. A) VPN network.
  2. B) SONET network.
  3. C) ISDN network.
  4. D) DDD network.

Answer:  A

Page Ref: 80

23) What is a key difference between 4G and 3G networks?

  1. A) 4G is a wireless network, 3G is not.
  2. B) 4G has higher data transmission rates than 3G.
  3. C) AT&T has an exclusive patent on 4G, but not 3G.
  4. D) 4G networks support smartphones, but 3G networks do not.

Answer:  B

Page Ref: 67, 76

 

24) Which of the following statements about network topologies is not true?

  1. A) A bus topology can be thought of as a simple “linear” topology.
  2. B) A ring topology is wired like a bus, except the ends of the cable are connected.
  3. C) A star topology is like a ring, except the hub is bigger.
  4. D) In a mesh topology, devices are directly connected to two, three, or more other devices in a seemingly irregular pattern.

Answer:  C

Page Ref: 70-71

 

25) Which of the following networking hardware devices forwards all messages it receives to all devices that are connected to it, whether or not the messages need to go there?

  1. A) gateway
  2. B) hub
  3. C) router
  4. D) switch

Answer:  B

Page Ref: 76-77

 

 

26) A broadband service offered by telephone companies that uses copper wires already installed in homes and offices to connect to the Internet is referred to as:

  1. A) DSL.
  2. B) cable modem.
  3. C) T1.
  4. D) VPN.

Answer:  A

Page Ref: 82-83

 

27) When considering network protocols, why is the multilayer OSI model still important?

  1. A) It provides a conceptual framework for how communication takes place in networks.
  2. B) It is specifically designed for Ethernet transmissions, which are quite common.
  3. C) It describes a protocol that is gradually replacing TCP/IP.
  4. D) It was designed by IBM.

Answer:  A

Page Ref: 86-87

 

28) Which of the following OSI model layers receives a packet of data from the transport layer and adds header data to it to identify the route the packet is to take to its destination?

  1. A) physical
  2. B) data link
  3. C) network
  4. D) transport

Answer:  C

Page Ref: 87

29) Which of the following network protocols is used on the Internet and has become the de facto standard protocol for networking around the world?

  1. A) SNA
  2. B) TCP/IP
  3. C) VPN
  4. D) OSI

Answer:  B

Page Ref: 88

 

30) In the United States, the two giants in the telephone industry in the decade of the 2010s are:

  1. A) T-Mobile and Sprint Nextel.
  2. B) Verizon and AT&T.
  3. C) BellSouth and SBC.
  4. D) GTE and Cingular.

Answer:  B

Page Ref: 90

 

31) Conversion of digital to analog signals so that the signals can travel over conventional telephone lines is accomplished with a device called a modem.

Answer:  TRUE

Page Ref: 64

32) The term modem stands for Modulator of Digital Electronic Messages.

Answer:  FALSE

Explanation:  Modem stands for modulator/demodulator.

Page Ref: 64

 

33) Early in the decade of the 2010s, two different technologies–WiMAX and LTE (Long Term Evolution)–are competing to become the dominant 4G network technology.

Answer:  TRUE

Page Ref: 76

 

34) A Universal Resource Locator (URL) is used to locate packets in a network.

Answer:  FALSE

Explanation:  A URL is the address of a particular Web site, and is used to jump to that Web site.

Page Ref: 82

 

35) By 2004, the number of cell phones in use in the United States was greater than the number of wired phones in homes.

Answer:  TRUE

Page Ref: 90

 

36) Using an Infrastructure as a Service provider can enable an organization to avoid major capital investments for network equipment as well as computer servers and storage.

Answer:  TRUE

Page Ref: 91

 

Managing Information Technology, 7e (Brown)

Chapter 4   The Data Resource

 

1) Which of the following statements about managing data is true?

  1. A) Reconciling inconsistent data can require a significant amount of time and money.
  2. B) Potential costs incurred by organizations for data loss are minimal.
  3. C) Today’s tools eliminate the need for data management positions.
  4. D) There are no consequences associated with noncompliance of a law due to poor data management.

Answer:  A

Page Ref: 95

 

2) Data that unambiguously describes other data for enterprise use are called:

  1. A) attributes.
  2. B) data models.
  3. C) entities.
  4. D) metadata.

Answer:  D

Page Ref: 97

 

3) In an ERD, a characteristic of a customer entity is diagrammed as a(n):

  1. A) sub-entity.
  2. B) attribute.
  3. C) data relationship.
  4. D) metadata.

Answer:  B

Page Ref: 97

 

4) A top-down data modeling approach to describe the data structure and other requirements of an organization, independent of any particular reports or screens, is called:

  1. A) corporate modeling.
  2. B) enterprise modeling.
  3. C) view integration.
  4. D) data consolidation.

Answer:  B

Page Ref: 98

 

5) A bottom-up approach to describe the data structure and other requirements of an organization, in which reports, screens, and relevant documents are analyzed, is called:

  1. A) corporate modeling.
  2. B) enterprise modeling.
  3. C) view integration.
  4. D) data consolidation.

Answer:  C

Page Ref: 98

 

6) The process of creating simple data structures from more complex ones, which yields a data model that is very stable and useful across many different requirements, is called:

  1. A) standardization.
  2. B) consistency.
  3. C) normalization.
  4. D) basic.

Answer:  C

Page Ref: 98

 

7) All of the following are true about using a pre-existing (packaged) data model, except:

  1. A) it cannot be customized to fit the terms and business rules of a specific organization.
  2. B) the modeling projects require less time and money.
  3. C) it may be easier to share data with other organizations in the industry.
  4. D) it is likely to work well with other applications from the same vendor.

Answer:  A

Page Ref: 98

 

8) The data modeling guideline that specifies the functional, business division, and/or corporate coverage is called the:

  1. A) objective.
  2. B) scope.
  3. C) outcome.
  4. D) timing.

Answer:  B

Page Ref: 99

 

9) The data modeling guideline that captures the need that justified the data modeling effort is specified in the:

  1. A) objective.
  2. B) scope.
  3. C) outcome.
  4. D) timing.

Answer:  A

Page Ref: 99

 

10) An example of a query language used for posing queries to a database is:

  1. A) SQL.
  2. B) ASP.
  3. C) XML.
  4. D) PHP.

Answer:  A

Page Ref: 100

 

 

11) An example of a data exchange language to pass data between computers for e-business is:

  1. A) SQL.
  2. B) ASP.
  3. C) XML.
  4. D) PHP.

Answer:  C

Page Ref: 100

12) Which of the following is not true about managing data in today’s large organizations?

  1. A) Application software is separate from the database software.
  2. B) Data is captured more than once to ensure accuracy.
  3. C) Data exists in databases for operational and managerial purposes.
  4. D) The need to manage data is continuous.

Answer:  B

Page Ref: 101

 

13) Databases for managerial control and other decision-making are often subsets, summaries, or aggregations of ________ with external data supplements.

  1. A) personnel databases
  2. B) strategic databases
  3. C) geographic databases
  4. D) operational databases

Answer:  D

Page Ref: 101

 

14) Which of the following statements about information processing with application independence is not true?

  1. A) Data are captured and stored in an operational database.
  2. B) Data that is accessed from a database for application processing is automatically deleted from the database.
  3. C) Subsets and aggregated operational data may be periodically transferred to a long-term data warehouse.
  4. D) none of the above

Answer:  B

Page Ref: 102

 

15) An application that moves data from one database to another and permits one source of data to serve many localized systems within an organization is called a:

  1. A) data analysis and presentation application.
  2. B) data capture application.
  3. C) data transfer application.
  4. D) disposable application.

Answer:  C

Page Ref: 103

 

 

16) An application that distributes data to authorized users and manipulates data to create useful information from established data sources is called a:

  1. A) data analysis and presentation application.
  2. B) data capture application.
  3. C) data transfer application.
  4. D) disposable application.

Answer:  A

Page Ref: 103

17) An application that gathers data and populates databases is called a:

  1. A) data capture application.
  2. B) data transfer application.
  3. C) data analysis and presentation application.
  4. D) disposable application.

Answer:  A

Page Ref: 103

 

18) Which of the following statements is true about the retention of data?

  1. A) All organizational data should be retained indefinitely.
  2. B) Some national laws require that certain types of data must be retained for certain periods of time.
  3. C) Emails should be retained in the same database as transaction data.
  4. D) none of the above

Answer:  B

Page Ref: 109

 

19) An unambiguous description of each type of data that applies to all business circumstances and users is called a(n):

  1. A) name.
  2. B) descriptor.
  3. C) identifier.
  4. D) definition.

Answer:  D

Page Ref: 105

 

20) A characteristic of a business entity that uniquely distinguishes it from other instances of the entity for the long term is called a(n):

  1. A) name.
  2. B) definition.
  3. C) identifier.
  4. D) integrity rule.

Answer:  C

Page Ref: 104

 

 

21) Which of the following prescribes who can do what and when to each kind of data?

  1. A) ranges
  2. B) integrity rules
  3. C) edit rules
  4. D) usage rights

Answer:  D

Page Ref: 105

 

22) A data dictionary/directory, or DD/D, contains each of the following, except:

  1. A) entity definitions.
  2. B) data element definitions.
  3. C) database server definitions.
  4. D) data standards.

Answer:  C

Page Ref: 105

23) ________ refers to the disciplines, technologies, and methods to ensure the currency, meaning and quality of reference data within and across various subject areas.

  1. A) DD/D
  2. B) MDM
  3. C) DBMS
  4. D) ERP

Answer:  B

Page Ref: 105

 

24) What organizational role or unit is responsible for functions such as physical database design, database interfaces with other technologies, and database recovery methods?

  1. A) data steward
  2. B) database administrator
  3. C) CIO
  4. D) data administration group

Answer:  B

Page Ref: 112

 

25) Determining the physical arrangement of data based on the data currently required by the business and expected to be required in the future is part of which of the following data resource management functions?

  1. A) organize and make accessible
  2. B) define/describe and inventory
  3. C) control quality and integrity
  4. D) accounting for usage

Answer:  A

Page Ref: 107

 

 

26) What organizational role or unit is responsible for functions such as maintaining metadata, reducing redundant data, and improving data quality across an organization?

  1. A) data steward
  2. B) database administrator
  3. C) CIO
  4. D) data administration

Answer:  D

Page Ref: 110

 

27) What organizational role or unit is responsible for the quality of the data in a particular subject database or departmental area?

  1. A) data steward
  2. B) database administrator
  3. C) CIO
  4. D) data administration

Answer:  A

Page Ref: 110

28) Each of the following is a critical step in a data quality initiative, except:

  1. A) cleaning up existing data errors.
  2. B) avoiding the usage of advanced data cleansing tools.
  3. C) establishing procedures to prevent errors.
  4. D) verifying that third-party vendors provide clean data.

Answer:  B

Page Ref: 109, textbox

 

29) Which of the following is a rationale for data ownership?

  1. A) the need to protect the privacy of personal data
  2. B) the need to protect trade secrets
  3. C) the need to share data with those who “need to know”
  4. D) all of the above

Answer:  D

Page Ref: 110

 

30) Which of the following is a justification given for laws that control data flows across national borders?

  1. A) promote economic imperialism
  2. B) protect a domestic industry
  3. C) protect individual privacy
  4. D) both B and C

Answer:  D

Page Ref: 111

 

31) If an organization maintains application independence, then application software can more easily be abandoned or replaced.

Answer:  TRUE

Page Ref: 103

32) Data warehouses provide a method for making historical and current data accessible for queries by many people throughout an organization.

Answer:  TRUE

Page Ref: 103

 

33) For legal reasons, all data should be stored indefinitely.

Answer:  FALSE

Explanation:  Some data should be retained, while other data should be disposed of at regular intervals, based on legal requirements and organizational policies.

Page Ref: 109

 

34) The permissible range or set of values for each data element is defined by integrity rules.

Answer:  TRUE

Page Ref: 105

Reviews

There are no reviews yet.

Be the first to review “Test Bank for Managing Information Technology 7th Edition by Brown, DeHayes, Slater”

Your email address will not be published. Required fields are marked *