Information Technology MCQs

?

A software package that is used with a large set of organized data that presents the computer as an expert on a particular topic is referred to as a...






?

Computer memory which is used to store programs that must be accessed immediately by the central processing unit is






?

The most common output device is a(n)






?

The part of the computer that does most of the data processing is referred to as the






?

An office suite of software is least likely to include a(n)






?

Software that performs a variety of general technical computer-controlling operations is a(n)






?

Which of the following is not a part of the central processing unit?






?

MIPS stands for






?

Which of the following represents a type of applications software that a large client is most likely to use?






?

Which of the following characteristics distinguishes computer processing from manual processing?






?

A general type of IT system that is designed to improve the productivity of daily office work is referred to as a(n)






?

The Systems Development Life Cycle (SDLC) is the traditional methodology for developing information systems. In which phase of the SDLC would the ac...






?

Samco Inc. is in the process of designing a new customer relations system. In which phase of the development life-cycle would a needs assessment mos...






?

Which of the following system implementation models has the advantage of achieving a full operational test of the new system before it is implemente...






?

Which computer application is most frequently used on mainframe computers?






?

Which computer application is most frequently used to analyze numbers and financial information?






?

Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to...






?

The most common type of primary storage in a computer is referred to as






?

A set of step-by-step procedures used to accomplish a task is a(n)






?

Which of the following compiles a complete translation of a program in a high-level computer language before the program is run for the first time? ...






?

GUI is the abbreviation for






?

Unix is a(n)






?

In a spreadsheet, each specific cell may be identified by a specific






?

In a spreadsheet, which of the following is correct concerning rows and columns? Rows . . . . Columns






?

Which of the following is least likely to be considered an advantage of a database?






?

Most current computers process data using which of the following formats?






?

Which term below describes the technology that allows multiple operating systems to run simultaneously on a single computer?






?

What type of secondary storage device requires no moving parts for read/write operations?






?

Another term for cloud-based storage is






?

The wireless input device that is used for inventory control and similar to bar-codes technology but does not require line-of sight access is






?

The 2nd generation programming language that is generally specific to a computer architecture (i.e., it is not portable) is






?

The online analytical processing term that represents a combination of systems that help aggregate, access, and analyze business data and assist in ...






?

What is the hierarchy of data organization, from smallest to largest unit, for a relational database?






?

A current day instruction to a computer such as Extract all Customers where Name is Smith would most likely relate to a






?

Several language interfaces exist in a database management system. These typically include a data definition language (DDL), a data control language...






?

Users making database queries often need to combine several tables to get the information they want. One approach to combining tables is known as






?

User acceptance testing is more important in an objectoriented development process than in a traditional environment because of the implications of ...






?

A companys management has expressed concern over the varied system architectures that the organization uses. Potential security and control concerns...






?

All of the following are methods for distributing a relational database across multiple servers except:






?

Client/server architecture may potentially involve a variety of hardware, systems software, and application software from many vendors. The best way...






?

What technology is needed in order to convert a paper document into a computer file?






?

Unauthorized alteration of online records can be prevented by employing






?

A manufacturer of complex electronic equipment such as oscilloscopes and microscopes has been shipping its products with thick paper manuals but wan...






?

Misstatements in a batch computer system caused by incorrect programs or data may not be detected immediately because






?

Which of the following is not a characteristic of a batch processed computer system?






?

Able Co. uses an online sales order processing system to process its sales transactions. Ables sales data are electronically sorted and subjected t...






?

First Federal S & L has an online real-time system, with terminals installed in all of its branches. This system will not accept a customers cash w...






?

Mill Co. uses a batch processing method to process its sales transactions. Data on Mills sales transaction tape are electronically sorted by custom...






?

Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to implement because the






?

In a computerized system, procedure or problem-oriented language is converted to machine language through a(n)






?

What type of computer system is characterized by data that are assembled from more than one location and records that are updated immediately?






?

Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce?






?

LAN is the abbreviation for






?

A computer that is designed to provide software and other applications to other computers is referred to as a






?

Which is least likely to be considered a component of a computer network?






?

The network most frequently used for private operations designed to link computers within widely separated portions of an organization is referred t...






?

A set of rules for exchanging data between two computers is a






?

A webpage is most frequently created using






?

Laptop computers provide automation outside of the normal office location. Which of the following would provide the least security for sensitive dat...






?

When developing a new computer system that will handle customer orders and process customer payments, a high-level systems design phase would includ...






?

A company using EDI made it a practice to track the functional acknowledgments from trading partners and to issue warning messages if acknowledgment...






?

Management is concerned that data uploaded from a microcomputer to the companys mainframe system in batch processing may be erroneous. Which of the...






?

One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these ...






?

One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these ...






?

Which of the following is a risk that is higher when an electronic funds transfer (EFT) system is used?






?

The use of message encryption software






?

A companys management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmit...






?

Which of the following is likely to be a benefit of electronic data interchange (EDI)?






?

The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following except:






?

Which of the following risks is more likely to be encountered in an end-user computing (EUC) environment as compared to a mainframe computer system?...






?

Which of the following risks is not greater in an electronic funds transfer (EFT) environment than in a manual system using paper transactions?






?

Methods to minimize the installation of unlicensed microcomputer software include all of the following except:






?

In traditional information systems, computer operators are generally responsible for backing up software and data files on a regular basis. In distr...






?

An auditor is least likely to find that a clients data is input through






?

End-user computing is an example of which of the following?






?

End-user computing is most likely to occur on which of the following types of computers?






?

Which of the following statements is correct regarding the Internet as a commercially viable network?






?

To reduce security exposure when transmitting proprietary data over communication lines, a company should use






?

Securing client/server systems is a complex task because of all of the following factors except:






?

Which of the following would an auditor ordinarily consider the greatest risk regarding an entitys use of electronic data interchange (EDI)?






?

Which of the following characteristics distinguish electronic data interchange (EDI) from other forms of electronic commerce?






?

Which of the following is considered a component of a local area network?






?

Which of the following represents an additional cost of transmitting business transactions by means of electronic data interchange (EDI) rather than...






?

Many entities use the Internet as a network to transmit electronic data interchange (EDI) transactions. An advantage of using the Internet for elect...






?

Which of the following is not considered an exposure involved with electronic data interchange (EDI) systems as compared to other systems?






?

Which of the following statements is correct concerning internal control when a client is using an electronic data interchange system for its sales?...






?

Which of the following statements most likely represents a disadvantage for an entity that keeps microcomputer-prepared data files rather than manua...






?

Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment?






?

Which of the following is a network node that is used to improve network traffic and to set up as a boundary that prevents traffic from one segment ...






?

Which of the following is an example of how specific controls in a database environment may differ from controls in a nondatabase environment?






?

A retail entity uses electronic data interchange (EDI) in executing and recording most of its purchase transactions. The entitys auditor recognized...






?

Which of the following is an encryption feature that can be used to authenticate the originator of a document and ensure that the message is intact ...






?

In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entitys computer system correspond...






?

Which of the following passwords would be most difficult to crack?






?

Which of the following is a password security problem?






?

Many of the Web 2.0 applications rely on an XML-based application that facilitates the sharing and syndication of web content, by subscription, Whic...






?

Which of the following is not one of the five principles of COBIT 5?






?

The Control Objectives for Information and Related Technology (COBIT) framework has been established by:






?

Which of the following procedures would an entity most likely include in its computer disaster recovery plan?






?

A company is concerned that a power outage or disaster could impair the computer hardwares ability to function as designed. The company desires off...