SlideShare a Scribd company logo
1 of 6
1. The device that acts as a connection point between computers
and can filter and forward data to a specified destination is
called a(n):
a. NIC.
b. router.
c. hub.
d. switch.
2. The method of slicing digital messages into parcels,
transmitting them along different communication paths, and
reassembling them at their destinations is called:
a. multiplexing.
b. ATM.
c. packet switching.
d. packet routing.
3. Which type of network serves a small group of computers,
allowing them to share resources and peripherals without
using a dedicated server?
a. LAN
b. Ring
c. Peer-to-peer
d. Wireless
4. Which type of network would be most appropriate for a
business that comprised three employees and a manager
located in the same office space, whose primary need is to share
documents?
a. PAN
b. Campus area network
c. Domain-based LAN
d. Peer-to-peer network
5. Which of the following is considered by many to be the
defining Web 2.0 application?
a. Instant messaging
b. Social networking
c. Blogging
d. E-mail
6. Instant messaging is a type of ________ service.
a. chat
b. e-mail
c. cellular
d. wireless
7. Prior to the development of ________, computer networks
used leased, dedicated telephone circuits to communicate
with other computers in remote locations.
a. servers
b. packet switching
c. coaxial cable
d. routers
8. A(n) ________ is a box consisting of a radio
receiver/transmitter and antennas that links to a wired
network, router, or hub.
a. access point
b. hot spot
c. wireless router
d. server
9. Electronic data are more susceptible to destruction, fraud,
error, and misuse because information systems concentrate
data in computer files that:
a. are unprotected by up-to-date security systems.
b. may be accessible by anyone who has access to the same
network.
c. can be opened with easily available software.
d. are easily decrypted.
10. The Internet poses specific security problems because:
a. Internet standards are universal.
b. it changes so rapidly.
c. it was designed to be easily accessible.
d. Internet data is not run over secure lines.
11. Which of the following statements about the Internet
security is not true?
a. The use of P2P networks can expose a corporate computer to
outsiders.
b. VoIP is more secure than the switched voice network.
c. A corporate network without access to the Internet is more
secure than one that provides access.
d. Instant messaging can provide hackers access to an otherwise
secure network.
12. Evil twins are:
a. e-mail messages that mimic the e-mail messages of a
legitimate business.
b. Trojan horses that appears to the user to be a legitimate
commercial software application.
c. bogus wireless network access points that look legitimate to
users.
d. fraudulent Web sites that mimic a legitimate business’s Web
site.
13. Redirecting a Web link to a different address is a form of:
a. snooping.
b. spoofing.
c. sniffing.
d. war driving.
14. Your company, an online clothing store, has calculated that
a loss of Internet connectivity for 5 hours results in a
potential loss of $1,000 to $2,000 and that there is a 50%
chance of this occurring. What is the annual expected loss
from this exposure?
a. $750
b. $1,000
c. $1,500
d. $3,000
15. Analysis of an information system that rates the likelihood
of a security incident occurring and its cost is included in
a(n):
a. risk assessment.
b. security policy.
c. business impact analysis.
d. AUP.
16. Biometric authentication:
a. only uses physical measurements for identification.
b. can use a person’s voice as a unique, measurable trait.
c. is inexpensive.
d. is used widely in Europe for security applications.
17. You have been asked to implement enterprise software for a
manufacturer of kitchen appliances. What is the first step
you should take?
a. Select the functions of the system you wish to use.
b. Select the business processes you wish to automate.
c. Map the company’s business processes to the software’s
business processes.
d. Map the software’s business processes to the company’s
business processes.
18. Supply chain complexity and scale increases when firms:
a. produce products and services that coordinate with hundreds
or more firms and suppliers.
b. manage the procurement, manufacturing, and distribution
functions themselves.
c. modify their existing workflows to comply with supply-chain
management systems.
d. move to globalization.
19. Supply chain software can be classified as either supply
chain ________ systems or supply chain ________ systems.
a. demand; continual
b. push; pull
c. upstream; downstream
d. planning; execution
20. A build-to-order supply-chain model is also called a
________ model.
a. supply-based
b. replenishment-driven
c. demand-driven
d. push-based
21. ________ modules deal with issues such as setting
objectives, employee performance management, and
performance-based compensation.
a. SCM
b. SFA
c. ERM
d. PRM
22. ________ modules use many of the same data, tools, and
systems as CRM to enhance collaboration between a
company and its selling partners.
a. SFA
b. PRM
c. SCM
d. ERM
23. Which of the following is not one of the four types of
customers described in the case study on Graybar?
a. Niche customers
b. Opportunistic customers
c. Marginal customers
d. Service-drain customers
24. Which metric is based on the relationship between the
revenue produced by a specific customer, the expenses
incurred in acquiring and servicing that customer, and the
expected life of the relationship between the customer and
the company?
a. Cost per sale
b. CLTV
c. Cost per lead
d. Churn rate
25. The measurement of the number of customers who stop
using or purchasing products or services from a company is
called:
a. switching costs.
b. switch rate.
c. churn rate.
d. CLTV.

More Related Content

Similar to 1. The device that acts as a connection point between computers and .docx

How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3enersivard
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfarishmarketing21
 
Assess CAS-004 Study Material For Comptia Exam.pdf
Assess CAS-004 Study Material For Comptia Exam.pdfAssess CAS-004 Study Material For Comptia Exam.pdf
Assess CAS-004 Study Material For Comptia Exam.pdfshirlybaker1
 
Further develop Your CAS-004 Dumps By Using The Study Kit.pdf
Further develop Your CAS-004 Dumps By Using The Study Kit.pdfFurther develop Your CAS-004 Dumps By Using The Study Kit.pdf
Further develop Your CAS-004 Dumps By Using The Study Kit.pdfshirlybaker1
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docxcorbing9ttj
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloudsriramr
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newlizabonilla
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newKatherineJack1
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newsweetsour2017
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newmarysherman2018
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paperShashi Bhushan
 
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxCOMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxnoel23456789
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?sriramr
 

Similar to 1. The device that acts as a connection point between computers and .docx (20)

Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
 
What are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdfWhat are the security requirements and challenges of Grid and Cloud .pdf
What are the security requirements and challenges of Grid and Cloud .pdf
 
Assess CAS-004 Study Material For Comptia Exam.pdf
Assess CAS-004 Study Material For Comptia Exam.pdfAssess CAS-004 Study Material For Comptia Exam.pdf
Assess CAS-004 Study Material For Comptia Exam.pdf
 
Further develop Your CAS-004 Dumps By Using The Study Kit.pdf
Further develop Your CAS-004 Dumps By Using The Study Kit.pdfFurther develop Your CAS-004 Dumps By Using The Study Kit.pdf
Further develop Your CAS-004 Dumps By Using The Study Kit.pdf
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
 
Web tech chapter 1 (1)
Web tech chapter 1 (1)Web tech chapter 1 (1)
Web tech chapter 1 (1)
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
 
Demystifying cloud
Demystifying cloudDemystifying cloud
Demystifying cloud
 
A presentation on cloud computing
A presentation on cloud computingA presentation on cloud computing
A presentation on cloud computing
 
A presentation on cloud computing
A presentation on cloud computingA presentation on cloud computing
A presentation on cloud computing
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer new
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer new
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer new
 
Cis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer newCis 210 week 11 final exam – strayer new
Cis 210 week 11 final exam – strayer new
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docxCOMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
COMP1609(2022-23)Network and Internet Technologyand DesignFaculty Head.docx
 
Bit%20 ch02
Bit%20 ch02Bit%20 ch02
Bit%20 ch02
 
Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?Demystifying Cloud: What is Cloud?
Demystifying Cloud: What is Cloud?
 

More from MargaritoWhitt221

Your supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docxYour supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docxMargaritoWhitt221
 
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxYour selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxMargaritoWhitt221
 
Your project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docxYour project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docxMargaritoWhitt221
 
Your initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docxYour initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docxMargaritoWhitt221
 
Your life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docxYour life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docxMargaritoWhitt221
 
Your original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docxYour original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docxMargaritoWhitt221
 
Your assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docxYour assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docxMargaritoWhitt221
 
Your assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docxYour assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docxMargaritoWhitt221
 
Your charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docxYour charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docxMargaritoWhitt221
 
Young consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docxYoung consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docxMargaritoWhitt221
 
You will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docxYou will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docxMargaritoWhitt221
 
You will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docxYou will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docxMargaritoWhitt221
 
You need to enable JavaScript to run this app. .docx
You need to enable JavaScript to run this app.      .docxYou need to enable JavaScript to run this app.      .docx
You need to enable JavaScript to run this app. .docxMargaritoWhitt221
 
You will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docxYou will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docxMargaritoWhitt221
 
You will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docxYou will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docxMargaritoWhitt221
 
You will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docxYou will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docxMargaritoWhitt221
 
You might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docxYou might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docxMargaritoWhitt221
 
You will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docxYou will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docxMargaritoWhitt221
 
You have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docxYou have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docxMargaritoWhitt221
 
1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docxMargaritoWhitt221
 

More from MargaritoWhitt221 (20)

Your supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docxYour supervisor, Sophia, Ballot Online director of information t.docx
Your supervisor, Sophia, Ballot Online director of information t.docx
 
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docxYour selected IEP. (Rudy)Descriptions of appropriate instructi.docx
Your selected IEP. (Rudy)Descriptions of appropriate instructi.docx
 
Your project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docxYour project sponsor and customer are impressed with your project .docx
Your project sponsor and customer are impressed with your project .docx
 
Your initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docxYour initial post should use APA formatted in-text citations whe.docx
Your initial post should use APA formatted in-text citations whe.docx
 
Your life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docxYour life is somewhere in a databaseContains unread posts.docx
Your life is somewhere in a databaseContains unread posts.docx
 
Your original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docxYour original initial post should be between 200-300 words and 2 pee.docx
Your original initial post should be between 200-300 words and 2 pee.docx
 
Your assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docxYour assignment is to research and report about an archaeological fi.docx
Your assignment is to research and report about an archaeological fi.docx
 
Your assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docxYour assignment for Physical Science I is to write a paper on.docx
Your assignment for Physical Science I is to write a paper on.docx
 
Your charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docxYour charge is to develop a program using comparative research, anal.docx
Your charge is to develop a program using comparative research, anal.docx
 
Young consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docxYoung consumers’ insights on brand equity Effects of bra.docx
Young consumers’ insights on brand equity Effects of bra.docx
 
You will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docxYou will examine a scenario that includes an inter-group conflict. I.docx
You will examine a scenario that includes an inter-group conflict. I.docx
 
You will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docxYou will perform a history of a head, ear, or eye problem that y.docx
You will perform a history of a head, ear, or eye problem that y.docx
 
You need to enable JavaScript to run this app. .docx
You need to enable JavaScript to run this app.      .docxYou need to enable JavaScript to run this app.      .docx
You need to enable JavaScript to run this app. .docx
 
You will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docxYou will act as a critic for some of the main subjects covered i.docx
You will act as a critic for some of the main subjects covered i.docx
 
You will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docxYou will research and prepare a presentation about image.  Your rese.docx
You will research and prepare a presentation about image.  Your rese.docx
 
You will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docxYou will be asked to respond to five different scenarios. Answer eac.docx
You will be asked to respond to five different scenarios. Answer eac.docx
 
You might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docxYou might find that using analysis tools to analyze internal .docx
You might find that using analysis tools to analyze internal .docx
 
You will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docxYou will conduct a professional interview with a staff nurse and a s.docx
You will conduct a professional interview with a staff nurse and a s.docx
 
You have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docxYou have chosen the topic of Computer Forensics for your researc.docx
You have chosen the topic of Computer Forensics for your researc.docx
 
1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx1.Describe some of the landmark Supreme Court decisions that h.docx
1.Describe some of the landmark Supreme Court decisions that h.docx
 

Recently uploaded

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

1. The device that acts as a connection point between computers and .docx

  • 1. 1. The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n): a. NIC. b. router. c. hub. d. switch. 2. The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: a. multiplexing. b. ATM. c. packet switching. d. packet routing. 3. Which type of network serves a small group of computers, allowing them to share resources and peripherals without using a dedicated server? a. LAN b. Ring c. Peer-to-peer d. Wireless 4. Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents? a. PAN b. Campus area network c. Domain-based LAN d. Peer-to-peer network 5. Which of the following is considered by many to be the defining Web 2.0 application?
  • 2. a. Instant messaging b. Social networking c. Blogging d. E-mail 6. Instant messaging is a type of ________ service. a. chat b. e-mail c. cellular d. wireless 7. Prior to the development of ________, computer networks used leased, dedicated telephone circuits to communicate with other computers in remote locations. a. servers b. packet switching c. coaxial cable d. routers 8. A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. a. access point b. hot spot c. wireless router d. server 9. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that: a. are unprotected by up-to-date security systems. b. may be accessible by anyone who has access to the same network. c. can be opened with easily available software. d. are easily decrypted.
  • 3. 10. The Internet poses specific security problems because: a. Internet standards are universal. b. it changes so rapidly. c. it was designed to be easily accessible. d. Internet data is not run over secure lines. 11. Which of the following statements about the Internet security is not true? a. The use of P2P networks can expose a corporate computer to outsiders. b. VoIP is more secure than the switched voice network. c. A corporate network without access to the Internet is more secure than one that provides access. d. Instant messaging can provide hackers access to an otherwise secure network. 12. Evil twins are: a. e-mail messages that mimic the e-mail messages of a legitimate business. b. Trojan horses that appears to the user to be a legitimate commercial software application. c. bogus wireless network access points that look legitimate to users. d. fraudulent Web sites that mimic a legitimate business’s Web site. 13. Redirecting a Web link to a different address is a form of: a. snooping. b. spoofing. c. sniffing. d. war driving. 14. Your company, an online clothing store, has calculated that a loss of Internet connectivity for 5 hours results in a potential loss of $1,000 to $2,000 and that there is a 50% chance of this occurring. What is the annual expected loss
  • 4. from this exposure? a. $750 b. $1,000 c. $1,500 d. $3,000 15. Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): a. risk assessment. b. security policy. c. business impact analysis. d. AUP. 16. Biometric authentication: a. only uses physical measurements for identification. b. can use a person’s voice as a unique, measurable trait. c. is inexpensive. d. is used widely in Europe for security applications. 17. You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? a. Select the functions of the system you wish to use. b. Select the business processes you wish to automate. c. Map the company’s business processes to the software’s business processes. d. Map the software’s business processes to the company’s business processes. 18. Supply chain complexity and scale increases when firms: a. produce products and services that coordinate with hundreds or more firms and suppliers. b. manage the procurement, manufacturing, and distribution functions themselves. c. modify their existing workflows to comply with supply-chain
  • 5. management systems. d. move to globalization. 19. Supply chain software can be classified as either supply chain ________ systems or supply chain ________ systems. a. demand; continual b. push; pull c. upstream; downstream d. planning; execution 20. A build-to-order supply-chain model is also called a ________ model. a. supply-based b. replenishment-driven c. demand-driven d. push-based 21. ________ modules deal with issues such as setting objectives, employee performance management, and performance-based compensation. a. SCM b. SFA c. ERM d. PRM 22. ________ modules use many of the same data, tools, and systems as CRM to enhance collaboration between a company and its selling partners. a. SFA b. PRM c. SCM d. ERM 23. Which of the following is not one of the four types of customers described in the case study on Graybar? a. Niche customers
  • 6. b. Opportunistic customers c. Marginal customers d. Service-drain customers 24. Which metric is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company? a. Cost per sale b. CLTV c. Cost per lead d. Churn rate 25. The measurement of the number of customers who stop using or purchasing products or services from a company is called: a. switching costs. b. switch rate. c. churn rate. d. CLTV.