Professional Documents
Culture Documents
Student No
Surname
Group No
General Remarks:
1. This is a closed book exam.
2. Attempt ALL questions.
3. Make sure you have 7 different pages including this page.
4. All work to be done in the spaces provided on the exam paper.
5. No books, notes and dictionaries are allowed.
6. Mobile phones are not allowed. All mobile phones should be switched
off during the exam.
Marks
Total (50 pts)
Good Luck..
1. What is phishing?
a. An investigative Web service
b. A type of Internet game that allows subscribers to find out information
about you and others living in its "virtual city"
c. Information bots that surf the Web for you searching for specific
information that you need
d. Email and other online techniques that attempt to gain personal
information from you
2. What is unsolicited email from businesses that advertise goods and
services?
a. Computer viruses
3.
4.
5.
6.
b. Spam
c. Cookies
d. Sneakware
What is the difference between spam and phishing?
a. Spam is sent via email; phishing is not
b. Phishing is about pornography; spam is not
c. Phishing attempts to get your personal information; spam does not
d. There is virtually no difference between spam and phishing
What technology hides your identity from the Web sites you visit?
a. AntiHacking
b. Private Agent Surfing Services (PASS)
c. Stealthware
d. Anonymous Web browsing (AWB)
If part of your academic work was to read the Wall Street Journal's
articles on information technology and these articles were automatically
delivered to your account, what type of technology would you be using?
a. M-commerce
b. Internet search and deploy
c. Push
d. Pull
Which of the following systems development techniques allows end
users to develop business applications?
a. Outsourcing
b. Insourcing
c. Netsourcing
d. Selfsourcing
7. The SDLC contains 7 phases. Which phase is devoted to creating a solid
plan for developing your information system?
a. Initiation
b. Planning
c. Design
d. Analysis
8. The SDLC contains 7 phases. Which phase verifies that the system works
and meets all the business requirements developed in an earlier phase?
a. Development
b. Transformation
c. Implementation
d. Testing
9. The SDLC contains 7 phases. Which phase monitors and supports the
new system to ensure it continues to meet your business goals?
a. Implementation
b. Testing
c. Maintenance
d. Operations
10.Which of the following occurs when the scope of the project increases
beyond its original intentions?
a. Scope creep
b. Feature creep
c. Milestone
d. Rolling stone
11.In what phase of the SDLC is the technical architecture for the proposed
system defined?
a. Planning
b. Design
c. Analysis
d. Development
12.Which of the following is not an advantage to prototyping?
a. Prototyping encourages active user participation
b. Prototyping helps resolve discrepancies among users
c. Prototyping gives users the final system
d. Prototyping helps determine technical feasibility
13.What option is available to you with outsourcing?
a. Purchase existing software
b. Purchase existing software and requiring modifications to it
c. Contracting for the development of a new information system
d. You can outsource each of these options
14.What is a formal document that describes in detail your logical
requirements for a proposed system and invites vendors to submit bids
for its development?
a. Requirements document
b. Design specification
c. Request for proposal (RFP)
d. Project scope document
15.If you were concerned about how a person would feel because of
something you did, you would be experiencing what type of influencing
circumstance?
a. Consequences
b. Likelihood of effect
c. Relatedness
d. Reach of result
16.Which of the following is the unauthorized use, duplication, distribution,
or sale of copyrighted software?
a. Pirated software
b. Spam
c. Phishing
d. Sneakware
17.What is the right to be left alone when you want to be, to have control
over your own personal possessions, and not to be observed without
your consent?
a. Ethics
b. Personal safety laws
c. Identity theft laws
d. Privacy
18.What program records every keystroke and mouse click executed on a
computer?
a. Keyboard recorder
b.
c.
d.
19.What
a.
Trojan horse
Virus
Key logger
is identity theft?
When a person losses that sense of self because of their heightened
activities on the Web
b. When a person, or group of people, take on another person's identify and
then send email and other online communications under the fraudulent
name
c. When one person changes their features and dress to resemble another
person
d. When a person, or group of people, forge someone's identity for the
purpose of fraud
c. Virtual Reality
d. Holosuite
27.What type of equipment can be used in a virtual reality environment?
a. Glove
b. Glove and Headset
c. Walker
d. Glove, Headset, and Walker
28.What type of technology enhances your experiences with computer
applications by adding a sense of touch to the environment?
a. Biometrics
b. Crowdsourcing
c. Haptic interface
d. CAVEs
29.An ATM card is an example of which form of biometric security?
a. What you know
b. What you have
c. Who you are
d. What you can do
30.Fingerprints are an example of which form of biometric security?
a. What you know
10
11
39.The SDLC contains 7 phases. Which phase distributes the system to all
the users so that they can use it to perform their jobs?
a. Implementation
b. Testing
c. Maintenance
d. Expansion
40.What is a common test that is performed to ensure the quality of the
information system you are building?
a. Unit and system testing
b. User acceptance testing
c. Integration testing
d. Unit, system, Integration, and user acceptance testing
41.If you were to allow only a select group of people to use the new system
so that you could determine if it was working correctly, what type of
implementation method would you be following?
a. Pilot implementation
b. Parallel implementation
c. Plunge implementation
12
d. Phase implementation
42.What is a process of building a model that demonstrates the features of
a proposed product, service, or system?
a. RAD
b. XP
c. Prototyping
d. Modeling
43.Which infrastructure-centric metric measures the error rate or the
number of errors per thousand (or million) that an information system
generates?
a. Accuracy
b. Throughput
c. Scalability
d. Critical success factor
44.
Which call center metric determines the percentage of callers who
hang up while waiting for their call to be answered?
a. Abandon rate
b. Lost calls
c. Missed rate
d. Failure to answer rate (FAR)
45.If you were trying to access your campus network but the system was
unable to respond to you because it was overwhelmed with a flood of
requests coming from some virus, what type of attack would you be
experiencing?
a. Worms
b. Script kiddies
c. Denial-of-service
d. Cyber blackmail
13
46.What is a CAVE?
a. A simulation device used to train and instruct special forcers in the
climbing, firefighting, and search and rescue industry
b. A three-dimensional computer simulation in which you can actively and
physically participate
c. A virtual reality room that can display images and other people from other
CAVEs
d. An advanced and secured communication system used for extremely
sensitive data
14