51. Which of the following non-digital data storage items is most similar to a database?
a. Cash register receipt
b. Library card catalog
c. List of sales totals on a spreadsheet
d. Doctor's office invoice
52. DBMS for midrange computers include all of the following EXCEPT:
a. DB2.
b. Microsoft SQL Server.
c. Oracle.
d. Microsoft Access.
53. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization, and security
is the:
a. data definition diagram.
b. data dictionary.
c. entity-relationship diagram.
d. relationship dictionary.
54. The most prominent data manipulation language today is:
a. Access.
b. SQL.
c. Crystal Reports.
d. DB2.
55. DBMSs typically include report-generating tools in order to:
a. retrieve and display data.
b. display data in an easier-to-read format.
c. perform predictive analysis.
d. display data in graphs.
56. Which of the following is not one of the techniques used in Web mining?
a. User mining
b. Content mining
c. Usage mining
d. Structure mining
57. A data warehouse is composed of:
a. historic and current internal data.
b. historical data from legacy systems.
c. internal and external data sources.
d. current data.
58. ________ tools are used to analyze large unstructured data sets, such as e-mail, memos,
survey responses, etc., to discover patterns and relationships.
a. Text mining
b. OLAP
c. Web content mining
d. Web mining
59. The special organizational function whose responsibilities include the technical and
operational aspects of managing data, including physical database design and maintenance,
is called:
a. database administration.
b. data auditing.
c. information policy administration.
d. data administration.
60. In TCP/IP, IP is responsible for:
a. disassembling and reassembling of packets during transmission.
b. moving packets over the network.
c. establishing an Internet connection between two computers.
d. sequencing the transfer of packets.
61. Which signal types are represented by a continuous waveform?
a. Laser
b. Optical
c. Analog
d. Digital
62. All network components connect to a single hub in a ________ topology.
a. domain
b. peer-to-peer
c. bus
d. star
63. A network that covers broad geographical regions is most commonly referred to as a(n):
a. intranet.
b. local area network.
c. wide area network.
d. peer-to-peer network.
64. Passive RFID tags:
a. are used in automated toll-collection systems.
b. enable data to be rewritten and modified.
c. have their own power source.
d. have a range of several feet.
65. Inputting data into a poorly programmed Web form in order to disrupt a company's systems
and networks is called:
a. key logging.
b. a Trojan horse.
c. a DDoS attack.
d. an SQL injection attack.
66. The Internet poses specific security problems because:
a. Internet data is not run over secure lines.
b. it changes so rapidly.
c. Internet standards are universal.
d. it was designed to be easily accessible.
67. An independent computer program that copies itself from one computer to another over a
network is called a:
a. Trojan horse.
b. worm.
c. pest.
d. bug.
68. Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a ________ attack.
a. phishing
b. DDoS
c. SQL injection
d. DoS
69. The Gramm-Leach-Bliley Act:
a. specifies best practices in information systems security and control.
b. outlines medical security and privacy rules.
c. requires financial institutions to ensure the security of customer data.
d. imposes responsibility on companies and management to safeguard the accuracy of
financial information.
70. The most common type of electronic evidence is:
a. voice mail.
b. instant messages.
c. spreadsheets.
d. e-mail.
71. Rigorous password systems:
a. are one of the most effective security tools.
b. may hinder employee productivity.
c. are often disregarded by employees.
d. are costly to implement.
72. Why is overstocking warehouses not an effective solution for a problem of low availability?
a. It increases inventory costs.
b. It increases sales costs.
c. It does not speed product time to market.
d. It is an inefficient use of raw materials.
73. Customer relationship management systems typically provide software and online tools for
sales, customer service, and:
a. account management.
b. marketing.
c. advertising.
d. public relations.
74. Customer service modules in CRM systems provide tools for:
a. managing sales prospect and contact information.
b. capturing prospect and customer data.
c. identifying profitable and unprofitable customers.
d. assigning and managing customer service requests.
75. Which of the following is an important capability for sales processes that is found in most
major CRM software products?
a. Returns management
b. Events management
c. Channel promotions management
d. Lead management

a. Cash register receipt
b. Library card catalog
c. List of sales totals on a spreadsheet
d. Doctor's office invoice
52. DBMS for midrange computers include all of the following EXCEPT:
a. DB2.
b. Microsoft SQL Server.
c. Oracle.
d. Microsoft Access.
53. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization, and security
is the:
a. data definition diagram.
b. data dictionary.
c. entity-relationship diagram.
d. relationship dictionary.
54. The most prominent data manipulation language today is:
a. Access.
b. SQL.
c. Crystal Reports.
d. DB2.
55. DBMSs typically include report-generating tools in order to:
a. retrieve and display data.
b. display data in an easier-to-read format.
c. perform predictive analysis.
d. display data in graphs.
56. Which of the following is not one of the techniques used in Web mining?
a. User mining
b. Content mining
c. Usage mining
d. Structure mining
57. A data warehouse is composed of:
a. historic and current internal data.
b. historical data from legacy systems.
c. internal and external data sources.
d. current data.
58. ________ tools are used to analyze large unstructured data sets, such as e-mail, memos,
survey responses, etc., to discover patterns and relationships.
a. Text mining
b. OLAP
c. Web content mining
d. Web mining
59. The special organizational function whose responsibilities include the technical and
operational aspects of managing data, including physical database design and maintenance,
is called:
a. database administration.
b. data auditing.
c. information policy administration.
d. data administration.
60. In TCP/IP, IP is responsible for:
a. disassembling and reassembling of packets during transmission.
b. moving packets over the network.
c. establishing an Internet connection between two computers.
d. sequencing the transfer of packets.
61. Which signal types are represented by a continuous waveform?
a. Laser
b. Optical
c. Analog
d. Digital
62. All network components connect to a single hub in a ________ topology.
a. domain
b. peer-to-peer
c. bus
d. star
63. A network that covers broad geographical regions is most commonly referred to as a(n):
a. intranet.
b. local area network.
c. wide area network.
d. peer-to-peer network.
64. Passive RFID tags:
a. are used in automated toll-collection systems.
b. enable data to be rewritten and modified.
c. have their own power source.
d. have a range of several feet.
65. Inputting data into a poorly programmed Web form in order to disrupt a company's systems
and networks is called:
a. key logging.
b. a Trojan horse.
c. a DDoS attack.
d. an SQL injection attack.
66. The Internet poses specific security problems because:
a. Internet data is not run over secure lines.
b. it changes so rapidly.
c. Internet standards are universal.
d. it was designed to be easily accessible.
67. An independent computer program that copies itself from one computer to another over a
network is called a:
a. Trojan horse.
b. worm.
c. pest.
d. bug.
68. Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a ________ attack.
a. phishing
b. DDoS
c. SQL injection
d. DoS
69. The Gramm-Leach-Bliley Act:
a. specifies best practices in information systems security and control.
b. outlines medical security and privacy rules.
c. requires financial institutions to ensure the security of customer data.
d. imposes responsibility on companies and management to safeguard the accuracy of
financial information.
70. The most common type of electronic evidence is:
a. voice mail.
b. instant messages.
c. spreadsheets.
d. e-mail.
71. Rigorous password systems:
a. are one of the most effective security tools.
b. may hinder employee productivity.
c. are often disregarded by employees.
d. are costly to implement.
72. Why is overstocking warehouses not an effective solution for a problem of low availability?
a. It increases inventory costs.
b. It increases sales costs.
c. It does not speed product time to market.
d. It is an inefficient use of raw materials.
73. Customer relationship management systems typically provide software and online tools for
sales, customer service, and:
a. account management.
b. marketing.
c. advertising.
d. public relations.
74. Customer service modules in CRM systems provide tools for:
a. managing sales prospect and contact information.
b. capturing prospect and customer data.
c. identifying profitable and unprofitable customers.
d. assigning and managing customer service requests.
75. Which of the following is an important capability for sales processes that is found in most
major CRM software products?
a. Returns management
b. Events management
c. Channel promotions management
d. Lead management