Column 1
Column 2
Column 3
Column 4
Column 5
100

Which of the following is true of SMTP? 

1. It is used for exchanging contact management data. 

2. It is a protocol for storing incoming mail.

3. It uses microformats to store metadata. 

4. It is used for handling outgoing mail. 

4. It is used for handling outgoing mail. 

100

A ________ is a microblogging tool in which posts on a similar topic are indicated by a keyword prefixed by a certain special character on microblogging websites. 

1. hashtag

2. wiki 

3. tag cloud 

4. mashup 

1. hashtag

100

When does a computer become a zombie? 

1. when it becomes immune to botnets 

2. when it is infected by malware 

3. when it is hidden behind a firewall 

4. when it enters a secure site 

2. when it is infected by malware 

100

A(n) ________ is an initiating process where stakeholders meet one another, sometimes for the first and only time. 

1. annual general meeting 

2. kickoff meeting 

3. pre-bid meeting 

4. board meeting 

2. kickoff meeting 

100

The ________ involves the sequential occurring of systems development life cycle tasks, with one activity starting only after the previous one has been completed. 

1. iterative method 

2. waterfall method

3. Gauss-Seidel method 

4. agile method 

2. waterfall method

200

Intellectual capital refers to ________. 

1. the assets that do not contribute to an organization's profitability 

2. the assets belonging to an enterprise that are freely available to the public 

3. the intangible assets and resources of an enterprise

4. the assets of an organization that can be sold to another organization 

3. the intangible assets and resources of an enterprise

200

Which of the following is a function of bots? 

1. They retrieve information from offline sources. 

2. They build teamwork and interpersonal skills of employees. 

3. They collect data from web pages on behalf of a user.

4. They monitor the productivity of employees in an organization. 

3. They collect data from web pages on behalf of a user.

200

A ________ is a self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage. 

1. honeypot

2. cookie

3. worm

4. Trojan horse

3. worm

200

A(n) ________ is an orderly listing of actual tasks that a project team must complete to produce the project's deliverables. 

1. executive summary 

2. mission statement 

3. work breakdown structure 

4. business case 

3. work breakdown structure 

200

The type of testing that involves end users performing final testing to determine whether a project is complete as specified is known as ________. 

1. parallel testing 

2. unit testing 

3. acceptance testing 

4. stress testing 

3. acceptance testing

300

________ refers to a system of moral principles that human beings use to judge right and wrong, and to develop rules of conduct. 

1. Ethics 

2. Theology

3. Religion

4. Creativity

1. Ethics

300

Data mining approaches and statistical techniques used to predict future behavior, especially to unlock the value of business intelligence for strategy, are known as ________. 

1. optimization 

2. content management systems 

3. predictive analytics

4. mashups 

3. predictive analytics

300

________ refers to an attack in which computers in a botnet are directed to flood a single website server with rapid-fire page requests, causing it to slow down or crash. 

1. Phishing 

2. Keylogging 

3. Social engineering 

4. Distributed denial of service

4. Distributed denial of service

300

A ________ lists tasks on the work breakdown structure, along with each task's projected start and finish dates, in graphical format. 

1. PERT network chart 

2. cluster diagram 

3. Gantt chart 

4. conceptual graph 

3. Gantt chart 

300

________ is a type of testing for information systems that involves programmers checking the functionality of small modules of code during the development phase of the systems development life cycle (SDLC). 

1. System testing 

2. Integration testing 

3. Acceptance testing 

4. Unit testing 

4. Unit testing

400

________ is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones. 

1. Utilitarianism 

2. Structuralism 

3. Individualism 

4. Libertarianism 

1. Utilitarianism 

400

________ is a decision support tool, often based on an Excel model, in which the user sets a target value for a particular variable, such as profit/ loss, and tells the program which variable to change to try to reach the objective. 

1. Market basket analysis 

2. Goal-seeking analysis

3. Goal harvesting 

4. Data aggregation  

2. Goal-seeking analysis

400

Which of the following is an accurate definition of a keylogger? 

1. software that prevents fraudsters from hacking into email accounts 

2. a process which helps a user increase productivity by deleting spam emails before they reach him 

3. a program that controls permissions for web traffic into and out of a computer network 

4. a monitoring software that records a user's keystrokes

4. a monitoring software that records a user's keystrokes

400

In which of the following project management areas is a Gantt chart most likely to be used? 

1. risk management 

2. time management 

3. human resource management 

4. scope assessment 

2. time management 

400

In the ________, tasks are not sequenced according to the systems development life cycle (SDLC) and many activities occur simultaneously. 

1. waterfall method 

2. agile method 

3. V-model method 

4. iterated method 

2. agile method

500

________ is a test created by software developers to thwart software bots that the visitor must pass before continuing to register or enter the site. 

1. HTML 

2. CAPTCHA

3. SMTP 

4. OLAP 

2. CAPTCHA

500

The term ________ is used to describe an extremely rare event that is difficult or nearly impossible to predict, but which can have an immense impact in areas such as technology, finance, and science. 

1. black swan 

2. Trojan horse 

3. long tail 

4. honeypot 

1. black swan

500

________ is a process which transforms data using mathematical formulas, so that no one can read the data unless they know the key to unscrambling it. 

1. Wear leveling 

2. Decipherment 

3. Encryption 

4. Write amplification 

3. Encryption 

500

The ________ refers to the longest course through the project, which identifies those tasks that cannot be delayed without affecting the finish date. 

1. critical path 

2. degree sequence 

3. graph bandwidth 

4. long tail 

1. critical path 

500

________ is an agile method for software development that relies on tightly knit, cohesive teams that do sprints of 2 to 4 weeks each. 

1. V-modeling 

2. Spiral modeling 

3. Extreme programming 

4. Scrum 

4. Scrum