Information Technology in Organizations Exam Preparation Guide - 1122 Verified Questions

Page 1


Information Technology in Organizations Exam Preparation Guide

Course Introduction

This course explores the strategic role of information technology (IT) within modern organizations, examining how IT enables innovation, supports business processes, and drives competitive advantage. Students will gain insight into the alignment of IT and organizational goals, the management of IT resources, and the evaluation of technology investments. Key topics include information systems, digital transformation, cybersecurity, ethical considerations, and the impact of emerging technologies on organizational structures and cultures. Through case studies and real-world examples, students will develop the skills needed to effectively leverage IT in diverse organizational contexts.

Recommended Textbook

Technology In Action Complete 11th Edition by

Available Study Resources on Quizplus

17 Chapters

1122 Verified Questions

1122 Flashcards

Source URL: https://quizplus.com/study-set/1390

Page 2

Chapter 1: Using Technology to Change the World

Available Study Resources on Quizplus for this Chatper

69 Verified Questions

69 Flashcards

Source URL: https://quizplus.com/quiz/27700

Sample Questions

Q1) ________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

A) Social networking

B) Crowdsourcing

C) Crisis-mapping

D) Affective computing

Answer: C

Q2) Purpose is the simple understanding that you are working for something larger than yourself.

A)True

B)False

Answer: True

Q3) Electronic junk mail is known as ________.

Answer: spam

Q4) The ________ is a collaboration of several museums that allows online visitors to explore over a thousand pieces of art.

Answer: Google Art Project

Q5) ________ applies computer systems and techniques to gather legal evidence.

Answer: Computer forensics

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Looking at Computers: Understanding the Parts

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27701

Sample Questions

Q1) All of the following are examples of nonvolatile storage EXCEPT ________.

A) hard disk drive

B) DVD

C) RAM

D) USB drive

Answer: C

Q2) Keyboards that display on screen when input of text is required are known as virtual keyboards.

A)True

B)False

Answer: True

Q3) RAM is a series of small cards plugged into slots on the ________.

Answer: motherboard circuit board

Q4) A(n) ________ is a computer that is designed to perform complex calculations very rapidly.

Answer: supercomputer

Q5) The width-to-height proportion of a monitor is known as the ________. Answer: aspect ratio

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Using the Internet: Making the Most of the Webs Resources

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27702

Sample Questions

Q1) All of the following are types of e-commerce business EXCEPT ________.

A) B2C

B) B2B

C) C2C

D) C2B

Answer: D

Q2) Tagging enables you to share your favorite websites with others.

A)True

B)False

Answer: True

Q3) Podcasts enable you to ________.

A) deliver audio/video files via RSS

B) post journal entries on the web

C) communicate with friends in real time

D) edit video files over the web

Answer: A

Q4) iphones and iPads use Flash to play videos.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Application Software: Programs That Let You

Work and Play

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/27703

Sample Questions

Q1) Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.

A) accounting

B) enterprise resource planning

C) project management

D) customer relationship management

Q2) Which of the following is the most common audio compression format?

A) WAV

B) AU

C) MP3

D) WMA

Q3) Desktop publishing software enables you to create newsletters and annual reports.

A)True

B)False

Q4) Software such as Apple Pages that is used to create résumés, letters, and other documents is called ________ software.

Q5) A Microsoft Office________ guides you through the steps necessary to finish a complicated task.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: System Software: the Operating System, Utility

Programs, and File Management

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27704

Sample Questions

Q1) All of the following are examples of network operating systems EXCEPT ________.

A) Windows 8

B) Linux

C) OS X

D) MS-DOS

Q2) PnP stands for ________.

Q3) Errors in computer software are called ________.

A) worms

B) beetles

C) bugs

D) spiders

Q4) The ________ contains an index to files that have been deleted or have been moved.

Q5) You can use System Restore to restore your system's settings back to a specific date when everything was working properly.

A)True

B)False

Q6) When a computer is booted, the ________ checks the computer's components.

Q7) MS-DOS first used a(n) ________ interface.

Q8) The fuel-injection system in car engine uses a(n) ________ operating system. Page 7

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 6: Understanding and Assessing Hardware:

Evaluating Your System

Available Study Resources on Quizplus for this Chatper

71 Verified Questions

71 Flashcards

Source URL: https://quizplus.com/quiz/27705

Sample Questions

Q1) RAM is an example of ________ storage because when the power is turned off, RAM is cleared out.

Q2) The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.

A)True

B)False

Q3) The control unit is one component of the ________.

A) CPU

B) cache

C) front side bus

D) clock

Q4) Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them into your system memory.

A) SuperGet

B) SuperFetch

C) SuperTake

D) SuperRetrieve

Q5) ________ improves disk writing performance because data is written across two drives.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Networking: Connecting Computing Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27706

Sample Questions

Q1) WEP is a stronger form of security than WPA.

A)True

B)False

Q2) WPA stands for ________.

Q3) SSID stands for ________.

Q4) A router acts like a traffic signal on a network.

A)True

B)False

Q5) Data are sent through a network in bundles called ________.

A) packages

B) pouches

C) packets

D) nodes

Q6) The most popular transmission media option for wired Ethernet networks is UTP cable.

A)True

B)False

Q7) Many cities in the United States now provide a(n) ________ area network to allow Internet access to residents and tourists.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Q8) The capability of current devices to use earlier standards is known as ________.

Chapter 8: Digital Devices and Media: Managing a Digital Lifestyle

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27707

Sample Questions

Q1) A(n) ________ is a rule that squeezes the same audio and video information into less space.

Q2) The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.

A) Jumpstart

B) Upstart

C) Crowdfunder

D) Kickstarter

Q3) A tablet uses a full traditional operating system.

A)True

B)False

Q4) A(n) ________ cable carries all audio and video information from devices to a connected TV.

A) HDMI

B) S component

C) Ethernet

D) RJ11

Q5) A specialized chip included in the cell phone that handles digital compression data is called the ________.

Q6) Digital camera resolution is measured in ________. Page 11

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 9: Securing Your System: Protecting Your Digital

Data and Devices

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27708

Sample Questions

Q1) The most financially damaging cybercrime affecting individuals is ________.

Q2) Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

A) engineering

B) theft

C) pretexting

D) pharming

Q3) CAPTCHA stands for ________.

A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart

B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart

C) Completely Automated Public Turing Test to Tell Computers and Humans Apart

D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart

Q4) A ________ is a virus that is attached to documents such as Word or Excel files.

A) script virus

B) macro virus

C) polymorphic virus

D) Trojan horse

Q5) A(n) ________ virus is a series of commands that is executed without your knowledge.

Q6) A(n) ________ can help block unwanted, unsolicited e-mail. Page 13

To view all questions and flashcards with answers, click on the resource link above.

Page 14

Chapter 10: Behind the Scenes: Software Programming

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27709

Sample Questions

Q1) The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.

A) pseudocode

B) control structures

C) flowcharts

D) operators

Q2) The final step of the system development life cycle (SDLC) is ________.

A) testing and installation

B) maintenance and evaluation

C) analysis

D) design

Q3) During the program debugging stage, the people who will use the program test the software.

A)True

B)False

Q4) The standard set of vocabulary for pseudocode is specific and detailed.

A)True

B)False

Q5) ________-generation languages use symbols and commands to tell the computer what to do.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 11: Behind the Scenes: Databases and Information Systems

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27710

Sample Questions

Q1) The Siri personal assistant application on Apple's iPhone 5s is an example of a

A) natural language processing (NLP) system

B) decision support system (DSS)

C) management information system (MIS)

D) database management system (DBMS)

Q2) ________ is the process of ensuring that the data entered into a field meets specified guidelines.

Q3) In a database, another term for a table is a(n) ________.

Q4) Employees' last names would usually make an appropriate primary-key field. A)True

B)False

Q5) When creating a data warehouse, ________ is is the process that extracts data from source databases, reformats the data, and stores them in the warehouse.

Q6) In a relational database, when two tables have a common field, the link between the tables is known as a hyperlink.

A)True

B)False

Page 16

Q7) A group of related records is called a(n) ________.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Behind the Scenes: Networking and Security in the Business World

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27711

Sample Questions

Q1) MAC addresses and IP addresses are the same thing.

A)True

B)False

Q2) Most home networks use ________ cable, which is most susceptible to interference.

A) fiber-optic

B) unshielded twisted-pair

C) wi-fi

D) coaxial

Q3) A ring topology is also known as a(n) ________ topology.

Q4) A ________ is a group of two or more computers, or nodes, designed to share information and resources.

A) router

B) bus

C) bridge

D) network

Q5) A facial-recognition scanner is an example of a biometric authentication device.

A)True

B)False

Q6) A(n) ________ is made up of two or more LANs that are miles apart. Page 17

To view all questions and flashcards with answers, click on the resource link above.

Page 18

Chapter 13: Behind the Scenes: How the Internet Works

Available Study Resources on Quizplus for this Chatper

70 Verified Questions

70 Flashcards

Source URL: https://quizplus.com/quiz/27712

Sample Questions

Q1) A(n) ________ is a small program that resides on a server, is downloaded to the client, and runs when needed without additional data transfers between the client and server.

Q2) Which of the following is an example of an instant messenger service?

A) LinkedIn

B) Monster

C) Yahoo Messenger

D) Flickr

Q3) The ________ IP addressing scheme uses 128-bit addressing.

Q4) Which of the following information is NOT contained in a packet?

A) The size (in bytes) of the packet

B) The address to which the packet is sent

C) The address from where the packet originates

D) The data that are transmitted

Q5) When using packet switching, packets are always sent over the same route.

A)True

B)False

Q6) MIME stands for ________.

Q7) ________ combines HTML, cascading style sheets, and JavaScript.

Q8) In http://example.gov, what is the second-level domain?

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 14: Tif 1: the History of the Personal Computer

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/27699

Sample Questions

Q1) Within a year of its introduction in 1981, the ________ computer dominated the personal computer market.

Q2) Computers that used integrated circuits are referred to as third-generation computers.

A)True

B)False

Q3) What was the first word processing application to be used on personal computers?

A) WordPerfect

B) WordStar

C) Microsoft Word

D) Quattro-Pro

Q4) The Z1 is thought to be the first computer to include features such as a control unit and separate memory functions.

A)True

B)False

Q5) The Tabulating Machine Company later changed its name to ________.

Q6) The CP/M, which stands for ________, was the first operating system designed for the Intel 8080 chip, the processor for PCs.

Q7) Steve Jobs and Steve Wozniak are the founders of ________.

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 15: Tif 2: Information Technology Ethics

Available Study Resources on Quizplus for this Chatper

34 Verified Questions

34 Flashcards

Source URL: https://quizplus.com/quiz/27698

Sample Questions

Q1) Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology.

A)True

B)False

Q2) A person who does not conform to the approved standards of social or professional behavior ________.

A) violates social norms

B) practices situational ethics

C) follows rule utilitarianism

D) commits unethical behavior

Q3) Relativism holds that moral principles are dictated by cultural tastes and customs.

A)True

B)False

Q4) The proposed ________ Act seeks to prevent employers from demanding passwords to private sites from employees.

Q5) ________ is the right to be left alone as one pleases.

Q6) ________ is an ethical system in which individual happiness is not important, and the greater good should be considered.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 16: Tif 3: Under the Hood

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/27697

Sample Questions

Q1) A binary digit that represents a 0 or a 1 is called a(n) ________.

Q2) The collection of commands that a CPU executes is called the instruction set.

A)True

B)False

Q3) The Intel i7 Extreme Edition is a CPU that uses ________ processing.

Q4) Unicode is a system for representing ________.

A) integers

B) sounds

C) colors

D) characters

Q5) Level 1 cache is located farther away from the CPU than Level 3 cache.

A)True

B)False

Q6) The ASCII code is able to represent the alphabets of all modern and historic languages.

A)True

B)False

Q7) Mathematical operations and comparisons are performed in the ________.

Q9) ________ is the final step of the CPU machine cycle. Page 22

Q8) The hexadecimal number system is also known as the base-________ number system.

To view all questions and flashcards with answers, click on the resource link above.

Page 23

Chapter 17: Tif 4: Careers in It

Available Study Resources on Quizplus for this Chatper

36 Verified Questions

36 Flashcards

Source URL: https://quizplus.com/quiz/27696

Sample Questions

Q1) Which information technology job has the lowest predicted 10-year growth?

A) Computer programmer

B) Software developer

C) Computer support specialist

D) Computer and information research scientist

Q2) Game development jobs typically are divided into two paths: designers and ________.

Q3) The Institute of Electrical and Electronics Engineers (IEEE) is an organization that provides leadership and determines engineering standards for network computing devices and protocols.

A)True

B)False

Q4) When a U.S. company hires a company outside of the United States, it uses a technique called ________.

A) offshoring

B) offtracking

C) telecommuting

D) exporting

Q5) Network administrators are sometimes called network ________.

Q6) The percentage of women in the IT workforce is ________%.

To view all questions and flashcards with answers, click on the resource link above. Page 24

Turn static files into dynamic content formats.

Create a flipbook