Which of the following is true of SMTP?
1. It is used for exchanging contact management data.
2. It is a protocol for storing incoming mail.
3. It uses microformats to store metadata.
4. It is used for handling outgoing mail.
4. It is used for handling outgoing mail.
A ________ is a microblogging tool in which posts on a similar topic are indicated by a keyword prefixed by a certain special character on microblogging websites.
1. hashtag
2. wiki
3. tag cloud
4. mashup
1. hashtag
When does a computer become a zombie?
1. when it becomes immune to botnets
2. when it is infected by malware
3. when it is hidden behind a firewall
4. when it enters a secure site
2. when it is infected by malware
A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time.
1. annual general meeting
2. kickoff meeting
3. pre-bid meeting
4. board meeting
2. kickoff meeting
The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed.
1. iterative method
2. waterfall method
3. Gauss-Seidel method
4. agile method
2. waterfall method
Intellectual capital refers to ________.
1. the assets that do not contribute to an organization's profitability
2. the assets belonging to an enterprise that are freely available to the public
3. the intangible assets and resources of an enterprise
4. the assets of an organization that can be sold to another organization
3. the intangible assets and resources of an enterprise
Which of the following is a function of bots?
1. They retrieve information from offline sources.
2. They build teamwork and interpersonal skills of employees.
3. They collect data from web pages on behalf of a user.
4. They monitor the productivity of employees in an organization.
3. They collect data from web pages on behalf of a user.
A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.
1. honeypot
2. cookie
3. worm
4. Trojan horse
3. worm
A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables.
1. executive summary
2. mission statement
3. work breakdown structure
4. business case
3. work breakdown structure
The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________.
1. parallel testing
2. unit testing
3. acceptance testing
4. stress testing
3. acceptance testing
________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct.
1. Ethics
2. Theology
3. Religion
4. Creativity
1. Ethics
Data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy, are known as ________.
1. optimization
2. content management systems
3. predictive analytics
4. mashups
3. predictive analytics
________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash.
1. Phishing
2. Keylogging
3. Social engineering
4. Distributed denial of service
4. Distributed denial of service
A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format.
1. PERT network chart
2. cluster diagram
3. Gantt chart
4. conceptual graph
3. Gantt chart
________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the systems development life cycle (SDLC).
1. System testing
2. Integration testing
3. Acceptance testing
4. Unit testing
4. Unit testing
________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones.
1. Utilitarianism
2. Structuralism
3. Individualism
4. Libertarianism
1. Utilitarianism
________ is a decision support tool, often based on an Excel model, in which the user sets a target value for a particular variable, such as profit/ loss, and tells the program which variable to change to try to reach the objective.
1. Market basket analysis
2. Goal-seeking analysis
3. Goal harvesting
4. Data aggregation
2. Goal-seeking analysis
Which of the following is an accurate definition of a keylogger?
1. software that prevents fraudsters from hacking into email accounts
2. a process which helps a user increase productivity by deleting spam emails before they reach him
3. a program that controls permissions for web traffic into and out of a computer network
4. a monitoring software that records a user's keystrokes
4. a monitoring software that records a user's keystrokes
In which of the following project management areas is a Gantt chart most likely to be used?
1. risk management
2. time management
3. human resource management
4. scope assessment
2. time management
In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) and many activities occur simultaneously.
1. waterfall method
2. agile method
3. V-model method
4. iterated method
2. agile method
________ is a test created by software developers to thwart software bots that the visitor must pass before continuing to register or enter the site.
1. HTML
2. CAPTCHA
3. SMTP
4. OLAP
2. CAPTCHA
The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science.
1. black swan
2. Trojan horse
3. long tail
4. honeypot
1. black swan
________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it.
1. Wear leveling
2. Decipherment
3. Encryption
4. Write amplification
3. Encryption
The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date.
1. critical path
2. degree sequence
3. graph bandwidth
4. long tail
1. critical path
________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each.
1. V-modeling
2. Spiral modeling
3. Extreme programming
4. Scrum
4. Scrum