You are on page 1of 10

1.

________________isaglobalnetworkofcomputernetworks
a. Intranet
b. Extranet
c. Internet
d. Simnet
2. WebissynonymuswiththeInternet
a. True
b. False
3. The____________functionsasthetransportmechanism,andthe________________isan
applicationthatusesthosetransportfunctions
a. Web;Internet
b. Internet;Web
c. Internet;Intranet
d. Intranet;Internet
4. WiththecommercializationoftheInternetintheearly1990's,wehaveseenanexplosionof
commercialapplications.Theseapplicationsevolvethroughfourmajorphases.Thesephases
are:
a. Presence,ecommerce,facilitation,andcollaboration
b. Informationdissemination,ecommerce,facilitationandcollaboration
c. Presence,ecommerce,collaboration,andintegration
d. Presence,ecommerce,collaborationandmcommerce
5. Theinternetsupportsapplicationsinthefollowingmajorcategories.
a. Presence,ecommerceandcollaboration
b. Discovery,communicationandcollaboration
c. Presence,ecommerceandintegration
d. Discovery,communicationandintegration
6. Abigstumblingblocktotheadoptionofcollaborativecommerceis:
a. Thelackofstablecollaborativecommercesoftware
b. Thelackoftopmanagementsupport
c. Thelackofwelldefinedanduniversallyagreedonstandards
d. Thelackofawarenessofthebenefitsofcollaborativecommerce
7. Softwarecanbedownloadedforreview,butyouareexpectedtopayfotitifyoudecideyou
wanttouseit?
a. True
b. False
8. ______________referstocommunicationinwhichthereceivergetsananswersometimeafter
arequestwassent
a. Asynchronouscommunication
b. Synchronouscommunication
c. Realtime
d. Noneoftheabove
9. Despitethemanypotentialbenefits,ecollaborationandccommercearemovingaheadfairly
slowly.Reasonscitedinvariousstudiesinclude:
a. Technicalreasons

10.

11.

12.

13.

14.

15.

16.

b. Securityandprivacyconcerns
c. Internalresistancetoinformationsharingandtonewapproaches
d. Lackofinternalskillstoconductcollaborativecommerce
Theinternetfunctionsasthe_______________andtheWeb(WWWorW3)isanapplication
thatusesthosetransportfunctions
a. Website
b. Storagemechanism
c. Servermechanism
d. Transportmechanism
________________cancarryoutamassiveautonomussearchoftheWebonbehalfofauser
a. Holdingagents
b. Indexingagents
c. Internetserviceproviders
d. Alloftheabove
Workflowisthemovementofinformationasitflowsthroughthesequenceofstepsthatmake
upanorganization'sworkprocedures
a. True
b. False
A(n)_____________isaninfrastructurethatallowssecurecommunicationsamongbusiness
partnersovertheinternet.
a. Commercialapplication
b. Intranet
c. Extranet
d. Network
A_____________isapersonalwebsiteopentothepublic,inwhichtheownerexpresseshisor
herfeelingsoropinions
a. Webpage
b. Webblog
c. Blog
d. Softbot
Anetworkdesignedtoservetheinternalinformationneedsofacompany,usinginternet
conceptsandtoolsisa(n)___________________
a. Intranet
b. Extranet
c. Collaboration
d. LAN
Thetermforthemovementofinformationasitflowsthroughthesequenceofstepsthatmake
upanorganization'sworkproceduresisa_________________
a. Workflowsystem
b. Workflowmanagement
c. Workflow
d. Workflownetwork

17. __________________canbedefinedasanysoftwarethatsupportsactualhumaninteractions
a. Softwareagent
b. Supersoftware
c. Socialsoftware
d. Peoplesoftware
18. Whichofthefollowingisnotaninformationportal?
a. Mobileportal
b. Personalportal
c. Commercialportal
d. Groupportal
19. Whichisnotafactorusedtodeterminetheuseofinformationtechnologyforcommunication
a. Media
b. Time
c. Place
d. Communication
20. WhichofthefollowingisNOTabenefitofecommerce?
a. Beingabletomakepurchasesinthecomfortofyourownhouse
b. Theabilitytohaggleoverpricesinrealtime
c. Expandstheglobalmarket
d. Providesconsumerwithawidevarietyofonlinevendorstochoosefrom
21. Theinputdevicesacceptdataandinstructionsandconvertthemtoaformthatacomputercan
understand
a. True
b. False
22. Thefirstgenerationofcomputers,from1946toabout1956,usedvacuumtubestostoreand
processinformation.
a. True
b. False
23. Accesingdataonharddisksisbasedondequentalaccess.
a. True
b. False
24. RAMisvolatilememory,ROMisnonvolatile
a. True
b. False
25. WindowsNTisserveroperatingsystem
a. True
b. False
26. Acomputersystemwithtwoormoreprocessorsisreferredtoasaparallelprocessingsystem:
a. True
b. False
27. Isthishierarchyinmemorycapacitycorrect:Megabyte,Gigabyte,Petabyte,Terabyte?
a. True
b. False

28. RAMisthecenterofallcomputerprocessingactivities,whereallprocessingiscontrolled,data
aremanipulated,arhimeticcomputationareperformed,andlogicalcomparionsaremade.
a. True
b. False
29. Themaincomponentofsystemssoftwareisasetofprogramscollectivelyknownasthe
operatingsystem.
a. True
b. False
30. 8bitscomprisingabytecanrepresentanyof:256uniquecaracters
31. Unicodehasthecapacitytorepresentmorethan:65.00charactersandsympols
32. MaininternetprotocolisTCP/IP
33. WhichofthefollowingITvendorshasnoserverconfiguration(computer)initsprogram:DELL
34. MostwidelyusedcommunicationmediainLANsystemis:Twistedpaircable
35. Twoinstructionsetstrategiesthatareusedinprocessordesignexisttoday:CISCandRISC
36. Computerthattypicallysupportcomputernetworksis:Server
37. COBOLis:Procedurallanguage
38. Languagethatallowstheusertosepcifythedesiredresultswithouthavingtospecifythe
detailedproceduresneededtoachievetheresultsis:Nonprocedurallanguage
39. Continuouswavesthatcarryinformationbyalteringtheamplitudeandfrequencyofthe
wavesare:Analogsignals
40. The______________approachdefinesaninitiallistofuserrequirements,buildsaprototype
systemandthanimprovesthesysteminseveralliterationsbasedonusersfeedback:
Prototyping

SCHOOL OF ECONOMICS AND BUSINESS IN SARAJEVO


BUSINESS INFORMATICS
Final
Student: _____________________________, Index No: _______________
1. A sufficient number of bits to represent specific characters letters, numbers, and special symbolsis known as a
byte, usually 4 bits.
a) True
b) False (usually 8 bits)
...
-1 0 2

2.
a)
b)

The first generation of computers, from 1946 to about 1956, used vacuum tubes to store and process information.
True
False
-1 0 2

3.
a)
b)
c)

Unicode has the capacity to represent more than


32 000
65 000
124 000 characters and symbols

4.
a)
b)

Is this hierarchy in memory capacity correct: Megabyte, Gigabyte, Petabyte, Terabyte


Yes
No

-1 0 2

-1 0 2

5.

Workstations are typically based on RISC architecture.

-1 0 2

6.
Two instruction set strategies that are used in processor design exist today:
a) Intel and AMD
b) CISC and RISC
c) HP and IBM

-1 0 2

7. There are two types of cache memory in the majority of computer systems:
Level 1 (L1) cache that is located on processor
Level 2 (L2) cache that is located on the motherboard

-1 0 2

8.
a)
b)

Accessing data on hard disk is based on sequential access.


True
False

9.
a)
b)

RAM is volatile memory, ROM is nonvolatile


True
False

-1 0 2

10.
a)
b)
c)

8 bits comprising a byte can represent any of


64
128
256 unique characters

-1 0 2

11.
a)
b)
c)
12.
a)
b)
c)

Main Internet protocol is:


ISP
TCP/IP
IPX

-1 0 2

-1 0 2

Which of the following IT vendors has no server configuration (computer) in its program:
HP
Dell
Microsoft
-1 0 2

13. Windows XP is a server operating system


a) False
b) True
14. Intel Itanium is a 128-bit operating system
a) True
b) False
15.
a)
b)
c)

Most widely used communication media in LAN system is:


Coaxial cables
Twisted-pair cables
DSL

16.
a)
b)
c)

Systems software can be grouped into three major functional categories:


___System control programs_________________________
______ System support programs ________________
______ System development programs ________________

17. The operating system performs four major functions:

-1 0 2

-1 0 2

-1 0 2

0123

job managment, resource managment, server consildation and data managment

0123

18. List three versions of Windows OS:


Windows 95
Windows 98
Windows NT
Windows 2000
Windows XP and Windows Vista.
0123
19. List three Mobile Device Operating Systems.
Linux, Microsoft's Windows CE and Pocket PC, Palm OS from Palm
0123
20. OCR is ....
Optical Character Reader (or Optical Scanner). With an optical character reader
(OCR), source documents such as reports, typed manuscripts, and books can be entered
directly into a computer without the need for keying.An OCR coverts text and images
on paper into digital form and stores the data on disk or other storage media.

SCHOOL OF ECONOMICS AND BUSINESS IN SARAJEVO


BUSINESS INFORMATICS
Final
Student: _____________________________, Index No: _______________
1. A sufficient number of bits to represent specific characters letters, numbers, and special symbolsis known as a
byte, usually 8 bits.
a) True
b) False
-1 0 2

2.
a)
b)

The second generation of computers, 19571963, used integrated circuits.


True
False
(transistors)

3.
a)
b)
c)

Unicode has the capacity to represent the following number of characters:


65000
32000
128000

4.
a)
b)

Is this hierarchy in memory capacity correct: Gigabyte, Terabyte, Petabyte


Yes
No

-1 0 2

-1 0 2

-1 0 2

5.
a)
b)
c)

There are two basic components that storage hardware is consisted of:
Hard disk and magnetic type
Hard disk and floppy disk
Storage device and storage media

6.
a)
b)
c)

Two instruction sets that are used in processor design are as follows:
Intel and AMD
Pentium and Celeron
CISC and RISC

7.
a)
b)

RAM is "built-in" computer memory containing data that normally can only be read, not written to.
True
False
-1 0 2

8.
a)
b)

Accessing data on magnetic tapes is based on direct access.


True
False(It's sequential (or serial) access)

9.
a)
b)

RAM is volatile memory, ROM is nonvolatile


True
False

-1 0 2

10.
a)
b)
c)

A byte can represent any of _____ unique characters


64
128
256 (2^8)

-1 0 2

11.
a)
b)
c)

IIS and Apache are:


Servers
Email Servers
Web Servers

12.
a)
b)
c)

Which of the following configurations replaced mainframes and minicomputers:


PCs
Workstations
Servers

13.
a)
b)
c)

Linux can be used as


Desktop operating system (unix vendors focus on server development and promote linux for desktop use)
Server operating system
Both desktop and server OS
-1 0 2

14. Intel Itanium is a 64-bit operating system


a) True
b) False(its a microprocessor)
15.
a)
b)
c)

Most prevalent form of communications wiring is:


Coaxial cables
Twisted-pair cables
Fiber Optic cables

16. Systems software can be grouped into three major functional categories:
a) ___System control programs_________________________
b) ______ System support programs ________________

-1 0 2

-1 0 2

-1 0 2

-1 0 2

-1 0 2

-1 0 2

-1 0 2

c)

______ System development programs ________________

0123

17. List and briefly explain the three main processor characteristics:
a) Word size- the number of bits that are handled as a unit within a particular computer's bus or during internal
processing (32 bit, recently 64 bit )
b) Processor speed-in a computer,clock speed refers to the number of pulses per second generated by an oscillator that
sets the tempo for the processor. Clock speed is usually measured in MHz (megahertz, or millions of pulses per second___
c) Desing type -2 main types of microprocessor-CISC & RISC_____
0123
18. PC motherboard holds the following main components:
Central Processing Unit - CPU
Memory
BIOS
Expansion slots
Interconnecting circuitry
0123
19. Main memory has four basic purposes:
To store data that have been input until they are transferred to the ALU for processing
.
To store data and results during intermediate stages of processing
. To hold data after processing until they are transferred to an output device
To hold program statements or instructions received from input devices and from
secondary storage

20. Give a short explanation of the following acronyms: ISP and ASP:
Internet service providers (ISPs) were established to provide connectivity, not
content. Many ISPs now offering dial-in Internet access to consumers initially were
set up to provide dedicated Internet connections to educational and commercial
organizations.
ASP (Active Server Pages) is a Microsoft CGI-like (common gateway
interface) technology that allows you to create dynamically generated Web pages
from the server side using a scripting language.

1. WWW(WorldWideWeb)isthemostwidelyusedapplicationonInternet.WWWisnot
thesamethinglikeInternet.
2. Internetapplicationcategoriesarediscovery,communicationandcollaboration.
3. Softwareagentsarecomputerprogramsthatcarryoutasetofroutinecomputertasks
onbehalfoftheuser.
4. SearchenginemaintainsanindexofhundredsofmillionsofWebpagesandusesthat
indextofindpagesthatmatchasetofuserspecifiedkeywords.
5. Wecanusetoolstorefinesearch.Forexample,metasearcherssearchseveralenginesat
once. Most of these helpers use software agent, some of which exhibit intelligent
behaviorandlearningarecalledintelligentagents(wizards,softbots...).
6. InformationportalisasinglepointofaccessthroughaWebbrowsertocriticalbusiness
informationlocatedinsideandoutsideofanorganization,anditcanbepersonalizedfor
eachuser.

7. Seventypesofportals:
Commercial(public)portalsoffercontentfordiversecommunitiesandarethemost
popularportalsontheNet.
Publishingportalsareintendedforcommunitieswithspecialinterests.
Personalportalstargetspecificfilteredinformationforindividuals.
Affinityportalssupportcommunitiessuchashobbygroupsorpoliticalparty.
Mobileportalsareportalsaccessiblefrommobiledevices.
Voiceportalsarewebportalswithaudiointerfaces.
8. Typesofcorporateportals:
A portal for suppliers: Using corporate portals suppliers can manage their own
inventoriesonline.
A portal for customers: Customers can use a customerfacing portal for viewing
productsandservicingandplacingorders.
Aportalforemployees:Suchportalsareusedfortrainingandworkplacediscussion
groups.
Supervisors'sportal:Thisportalenablesmanagersandsupervisorstocontrolentire
worforce.
9. ThreecommunicationmodelsontheWebare:
Peopletopeople;
Peopletomachine;
Peopleandmachinetomachine.
10. TocreateaframeworkofITcommunicationsupportwehave4factors:
Sametime/sameplaceparticipantsmeetfacetofaceinoneplace/time.
Sametime/differentplacedifferentplacesatsametime(phone,video).
Differenttime/sameplacewhenpeoplewotkinshifts.
Differenttime/differentplacesendingmessagesatdifferenttime(email).
11. Workgroupistermwherewehave2individualsormorewhoacttogethertoperform
sometasks.Ifgroupmembersareindifferentlocationswesaythatwehavevirtualgroup
(team).
12. Virtualcollaborationreferstotheuseofdigitaltechnologiesthatenableorganizationsor
individuals to collaboratively plan, design, develop products. Although ecollaboration
can involve noncommerce applications, the term frequently refers to collaborative
commercecollaborationamongbusinesspartners.
13. Workflowisthemovementofinformationasitflowsthroughthesequenceofstepsthat
makeupanorganization'sworkprocedures.Workflowmanagementistheautomationof
workflows,sothatdocuments,informationsortasksarepassedfromoneparticipantto
another in a way that is governed by organization's rules or procedures. Workflow
systemsarebusinessprocessautomationtoolsthatplacesystemcontrolsinthehandsof
userdepartments.
14. Groupware refers to software products that support groups of people who share a
commontaskorgoalandwhocollaborateonit'saccomplishment.
15. Teleconferencingistheuseofelectroniccommunicationthatallowstwoormorepeople
atdifferentlocationstohaveasimultaneousconference.

16. WebconferencingisconductedontheInternetforasfewastwoormorethousandsof
people.
17. RTCtoolsorRealtimecolaborationtoolshelpcompanybridgetimeandspacetowake
decisionsandtocollaborateonprojects.
18. Interactivewhiteboards?
Computerbasedwhiteboardsworklikeaphysicalworldwhiteboardwithmarkersand
erasers, expect with one big difference: instead of one person standing in front of a
meetingroomdrawingonwhiteboard,allparticipantscanjoinin.
19. Lotus/Notessuiteprovidesonlinecollaborationcapabilitiesworkgoupemail,distributed
database,ranking...
20. Socialsoftwarecanbededinedasanysoftwarethatsupportsactualhumaninteractions.
21. ElearningreferstolearningsupportedbyaWeb.
22. Distancelearning(DL)referstosituationwhereteachersandstudentsdonotmeetface
toface.
23. Telecommutingreferstoanarrangementwherebyemployeescanworkathome,atthe
customer'spremises,inspecialworkplacesorwhiletraveling.
24. TwowellknownbehavioursontheInternetarespammingandflaming.Spammingrefers
toindisciminatedistibutionofmessages,withoutconsiderationfortheirappropriatness.
Spammingisfrequentlyansweredbyflaming,whichreferstosendingangrymessages.

You might also like