Intro_to_Information_Tech_Highlights_Removed
Intro_to_Information_Tech_Highlights_Removed
FINAL TERM
Multiple choice questions (Choose the most appropriate answer)
1. ARPANET started with connecting 2. Egypt Telecom is an example of 3. Addresses issues impacting the
…..supercomputers a. Internet users future of the internet
a. Three b. Internet Content provider a. ICANN
b. Four c. Internet Service provider b. FCC
c. Five d. Application service provider c. W3C
d. Six d. ISOC
4. Devices that can connect to the internet 5. Satellite internet connection requires 6. Used to share knowledge, express
a. Personal Computers a. Modem opinions, share original poems
b. Smartphones b. Dish a. Podcasts
c. Televisions c. a and b b. RSS
d. All of the above d. none of the above c. Instant Messaging
d. Email
7. Who is responsible for managing the 8. What software is used to create, 9. Appears in all steps of SDLC
databases within an organization? maintain, and access databases?
a. Database Designer a. documentation
b. Database Programmer a. Data Backup system b. implementation
b. Data Security system c. prelimnary investigation
c. Database Administrator
c. Database Management System d. design
d. Database User
d. File Management Systems
10. A collection of related data that is stored in a 11. A collection of related fields in a 12. A request to see information from a
manner enabling information to be retrieved database, also called a row, is a ___. database that matches specific
as needed is called ___. a. Field criteria is called ___.
a. Database Management System b. Table a. Record
b. Database c. Record b. Table
c. Table d. Relation c. Query
d. Query d. Index
13. In a relational database, a collection of 14. Who write the programs needed to 15. What protects against data
related records (rows) is called ___. access the database or tie the database destruction in addition to
a. Record to other programs? unauthorized access of a database?
b. Field a. Database Programmers a. Data Security
c. Table b. Database Users b. Data Privacy
d. Query c. Database Designers c. Data Integrity
d. Database Administrators d. Data Collection
16. In a ___ database system, data is physically 17. ___ is used to prevent two users from 18. ___ is a software installed without
divided among several computers but changing the same data at the same user’s knowledge and transmits data
logically looks like a single database. time. secretly.
a. large a. Database locking a. Transmitters
b. centralized b. Database integrity b. Botnets
c. homogenous c. Database security c. Spyware
d. distributed d. Database privacy d. Adware
19. A device used to connect network devices 20. Which of the following protocols is used 21. In networking, the amount of data
via cabling is called a ___. by internet browsers to load webpages? transferred in a period of time is ___.
a. repeater a. pipeline
b. modem a. HTTP protocol b. capacity
c. switch b. SMTP protocol c. performance
d. wireless access point c. DNS protocol d. bandwidth
d. FTP protocol
1
22. Which of the following is NOT a protocol? 23. Ctrl + X is the shortcut for 24. A device used to amplify signals on a
a. Copy network is called ___.
a. TCP/IP a. Repeater
b. Paste
b. SMTP b. Modem
c. Cut
c. HTTP c. Switch
d. none of the above
d. Email d. Bridge
25. Components of information system includes 26. Neural networks used in 27. A component of Expert Systems
a. people, data, and procedures a. Connecting computers a. Knolwedge base
b. people, software and hardware b. Operating Systems b. Data warehouse
c. data, hardware and software c. Handwriting recongition c. Data mart
d. all choices are valid d. None of the above d. Data lake
28. A collection of computers with other devices 29. A system that uses satellites and a 30. A private network that is set up
that are connected together to share receiver to determine the exact similar to the World Wide Web for
resources with one another is called ___. geographic location of the receiver. use by employees of a specific
a. TCP/IP a. Global Positioning System organization
b. Mesh b. Geographic Play System a. Internet
c. Computer network c. General Placement Service b. Intranet
d. Cellular network d. Good Place Source c. Extranet
d. Word Small Word
31. A network topology has a central server that 32. A device that enables a computer to 33. Persons or organizations that publish
serves all nodes communicate over a telephone line is materials to the internet such as
called a ___. news, articles, or blogs are classified
a. Star topology a. repeater as ___.
b. Bus topology b. modem
c. Mesh topology c. switch a. Internet Service Providers
d. Tree topology d. wireless access point b. Internet Content Providers
c. Application Service Providers
d. Infrastructure Companies
34. Everyday objects are connected to the 35. Which of the following is NOT an 36. Which is not a valid type of
Internet, we call it ___. Internet application? application software
a. Object Internet a. Online Shopping a. freeware
b. Internet of Things b. Online Auction b. Hardware
c. Things Network c. Online Investing c. shareware
d. Object Oriented Network d. None of them d. commercial
37. Combines geographical information with 38. Evaluate company’s cloud needs and 39. Information System is a system used
other data to provide better understanding of deploy cloud solutions to generate the ___ needed to
data relationships a. Cloud Engineer support the users in an organization
a. GPS b. Cloud provider a. data
b. GIS c. Cloud service developer b. software
c. AIS d. Cloud Architect c. information
d. DSSs d. power
40. In Peer-to-Peer networks ___. 41. Examples of Integrated Enterprise 42. Which of the following is not an
a. a central server is essential Systems Internet protocol
b. a central server is not used a. ERP a. TCP
c. all computers are at the same functional level b. EDI b. EAI
d. b, c c. a and b c. FTP
d. none of the above d. HTTPS
43. Ctrl + P is the shortcut for 44. Examples of Intelligent Agents 45. Outsourced to another country
a. Print a. Chatbots a. offshore
b. Paste b. Application assistants b. inshore
c. Cut c. Siri c. nearshore
d. none of the above d. all of the above d. homeshore
2
46. SDLC stands for 47. SDLC starts with 48. The correct order of internet speed
a. software development life cycle a. documentation a. 10 Mbps > 10 Gbps > 10 Tbps
b. systems development life cycle b. implementation b. 10000 Mbps < 1 Gbps < 1 Tbps
c. software development life circle c. preliminary investigation c. 1 Mbps < 1 Gbps < 1 Tbps
d. systems development life circle d. design d. all orders are correct
49. The twisted-pair cables used in networks are 50. The following are network applications 51. Which is correct about Antennas
an example of except for a. used to measure the strength in dB
a. Wireless connections a. Videoconferencing b. used for sending radio signals only
b. Satellite connection b. Telecommuting c. used for sending radio signals only
c. Low-speed connection c. Ring network d. It must be directional
d. none of the above d. Telemedicine
52. We can arrange computers in a network 53. Which is not correct about TCP and IP 54. P2P is ... and M2M is ...
using a. TCP is Transmission Control Protocol a. peer to peer , many to many
a. Diamond topology b. IP is Iinternet protocol b. person to person , machine to
b. Hat topology c. IP Provides addresses and routing machine
c. Umbrella topology information c. peer to peer , machine to machine
d. Mesh topology d. IP Responsible for delivery of data d. person to person , many to many
55. Which is not correct about GPS 56. Which is correct about Networks are 57. The traditional approach in systems
a. GPS receivers available on modern mobile ordered according to their size development is
phones a. WAN < LAN < MAN a. Agile
b. Uses satellites and a receiver to determine b. MAN > LAN > PAN b. Prototyping
the exact geographic location of the receiver c. MAN > PAN > LAN c. Screening
c. GPS receivers used to guide vehicles and d. PAN > LAN > WAN d. Waterfall
equipment
d. stands for Global Partition System
58. A good searching strategy for the web is 59. Cost-Benefit Analysis is part of 60. Entity-Relationship Diagrams used in
a. Using common word a. System Acquisition a. System Acquisition
b. Using single searching site b. System Implementation b. System Implementation
c. Using single word c. Preliminary investigation c. Preliminary investigation
d. Using operators like AND, OR, NOT d. System Design d. System Analysis