ITIS204 Mock Exam - First Semester 2024-2025 PDF

Document Details

ViewableLightYear

Uploaded by ViewableLightYear

UOB

2025

Jenan haider

Tags

cloud computing computer science information technology mock exam

Summary

This document is a mock exam for ITIS204, focusing on cloud computing concepts, and includes true/false and multiple-choice questions for the first semester of 2024-2025. The exam covers various cloud computing environments, advantages, and practical applications.

Full Transcript

DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan ha...

DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 Mock Exam 12) Search engine optimization are keywords that advertisers choose to pay for and appear as sponsored links on the Google 4) According to the ethical computer use policy, users should __________ the rules and, agreeing to use the system on that 13) ) Which of the following Cloud Computing Advantages? 4) List and describe the four primary cloud computing environments.(CH#6) ‫مكرر‬ results pages basis,______ to abide by the rules a. Accessibility , Availability , Cost Saving, Flexibility , Reliability , Portability , Capacity on Demand , Backup /Recovery ً ‫ الرجاء عدم تناقل أسئلة المراجعة بأي شكل كان مع أحد او ر‬: ‫مالحظة مهمة‬ 1) Private cloud:serves only one customer or organization and can be located on the customer’s premises or off the ‫نشها يف القروبات و أيضا عدم رميها عند قاعة المتحان او‬ a) True a. be informed of; collaborate and Scalability ‫يج تعاريف عشوائية من جميع الجباتر‬ ‫ى‬ customer’s premises(Single-tenancy) ‫الدخول بها حت ال تسبب ضر لكم—التوصيل ي‬ b) False b. consent to; be informed b. Accessibility , Security: , Scalability , Cost-effective: , Automatic backups , and Collaboration. o EX: Bank, government, Corporation 13) Adwords are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages c. be informed; consent c. Flexibility , Reliability , Cost Efficiency and Scalability a) True d. consent to; be informed d. Increased performance , Scalability and Cost savings.  1 2) Public cloud :promotes massive, global, and industrywide applications offered to the general public.( Multi-tenancy) b) False 5) What offers a pay-per-use revenue model similar to a metered service such as gas or electricity? r? o EX: Amazon EC2, Windows Azure 14) Which of the following companies used technology to revamp the business process of selling books? PART I: True or False (1M x 20Q = 20 Marks) 14) A hybrid cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only a. grid computing a. Netflix linked by technology that enables data and application portability. b. smart phones 3) Community cloud :serves a specific community with common business models, security requirements, and compliance b. Della considerations..( Multi-tenancy) 1) Worms are computer viruses that wait for a specific date before executing their instructions. a) True c. utility computing c. Zappos o EX: Private hospital, all colorado state government organization a. True b) False 6) The purpose of ________ is often to promote or discredit a public figure, political movement, or a company.? d. Amazon b. False 15) Using only data and information to make decisions and solve problems is the key to finding success in business. These are a. fake news 4) Hybrid cloud: includes two or more private, public, or community clouds, but each cloud remains separate and is only 2) Phishing reroutes requests for legitimate websites to false websites. also the only core drivers of the information age and the building blocks of business systems. b. microblogging 15) Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would linked by technology that enables data and application portability.( Mix of private, public, or community) a. True a) True c. folksonomy you classify Nike’s ebusiness strategy? ‫مهم‬ o EX: private cloud of the company and Public cloud for customers, suppliers and partners b. False b) False d. crowdsourcing a. information richness 3) Ecommerce includes business along with all activities related to internal and external business operations, such as servicing 16) Accessibility is Cloud computing allows users to access virtual applications software, such as database software, through the b. mass customization 5) List The core drivers of the information age. (CH#7) 7) Which cloud computing delivery models. c. personalization customer accounts, collaborating with partners, and exchanging real-time information. During Web 1.0, entrepreneurs Internet. This allows for access to more resources 1) Data: Raw facts that describe the characteristics of an event or object a. Private cloud, Public cloud, Hybrid cloud, Community cloud d. Interactivity began creating the first forms of ecommerce. a) True 2) Information: Data converted into a meaningful and useful context b. Infrastructure as a Service (IaaS) , Software as a Service (SaaS), Platform as a Service (PaaS) 16) Netflix creates a unique recommendation listing for each customer who revisits its website. How would you classify Netflix’s a) True b) False c. Disaster Recovery as a Service (DRaaS), Software as a Service (SaaS),Infrastructure as a Service (IaaS). 3) Business Intelligence : Information collected from multiple sources such as suppliers, customers, competitors, partners, b) False 17) The four common characteristics of big data include variety, veracity, volume, velocity. ebusiness strategy? and industries that analyzes patterns, trends, and relationships for strategic 4) Cybervandalism is a problem that occurs when someone registers purposely misspelled variations of well-known domain a) True 8) What is the internet protocol web browsers use to request and display web pages using universal resource locators? a. information richness 4) Knowledge: The skills, experience, and expertise, coupled with information and intelligence, that create a person's names b) False a. hypertext markup language (HTML) b. mass customization intellectual resources a) True b. hypertext transport preteeel (HTTP) c. personalization 18) One of the most important features of any BI system it is data visualization tools b) False a) True c. DARPA d. interactivity  2 b) False d. URL PART I: True or False (1M x 20Q = 20 Marks) 5) Tokens are small electronic devices that change user passwords automatically a) True 9) What is the ebusiness model that represents 80 percent of all online businesses and is typically more complex, requiring PART III: Essay Questions 19) Data science refers to the technology and processes used to gain intelligent, usable information from these databases. 1) Multi-tenancy in the cloud means that a single instance of a system serves multiple customers. In the cloud, each customer b) False a) True greater security needs? is called a tenant, and multiple tenants can access the same system. b) False a. consumer-to-consumer 1) Explains deepfake and fake news (CH#5) 6) A business model shows the hierarchy and organization of the employees in a division or company. a. True  Deepfake: Refers to a manipulated or synthesized media, typically videos or images, created using deep learning a) True 20) A private cloud serves only one customer or organization and can be located on or off the customer’s premises driving b. consumer-to-business b. False c. business-to-consumer and artificial intelligence (AI) techniques. b) False d. business-to-business o Ex: Deepfake Obama” video. the video was actually a deepfake, with Obama’s face superimposed onto 2) Unstructured data is data that is not defined and does not follow a specified format and is typically free-form text such as 7) Business intelligence is information collected from multiple sources such as suppliers, customers, competitors, partners, and a) True b) False the body of another individual emails, Twitter tweets, and text messages. industries that analyzes patterns, trends, and relationships for strategic decision making. 10) John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to  Fake news : Refers to false news stories created to be widely shared or distributed for the purpose of promoting or a. True a) True find out that airline tickets are far more expensive than they had anticipated. They decide to try to find cheaper tickets on b. False PART II: Multiple Choices (1Mx15Q = 15 Marks) discrediting a public figure, political movement, or a company. b) False- Priceline, where they are allowed to set the price they are willing to pay for the airline tickets. What form of ebusiness model are John and Jenny using? 3) Disruptive technology tends to provide us with better, faster, and cheaper products. 8) The majority of eBay’s customers are using a business-to-business (B2B) ebusiness model 1) Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on 2) Describe the relationship between information security policies and an information security plan. (CH#9) how you view the relationship between which of the following? a. CBC a. True a) True 1. Information security policies: identify the rules required to maintain information security. a. legal and confidential b. B2B b. False b) False o Ex: as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and b. legal and ethical c. C2B changing passwords every 30 days. 4) Volume in big data includes the uncertainty of data, including biases, noise, and abnormalities. 9) Social tagging is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. c. legal and technical d. C2C a) True d. confidential and open 2. An information security plan :details how an organization will implement the information security policies. a. True b) False 11) What do Netflix and Amazon use to drive their recommendation tools? b. False o The best way a company can safeguard itself from people is by implementing and communicating its information 2) Which of the following represents the definition of information compliance? a. Web 1.0 content 10) Variety in big data includes different forms of structured and unstructured data. security plan. a. the act of conforming, acquiescing, or yielding information b. open source content 5) Ethics and security are two fundamental building blocks for all organizations. b. the ability to comply with software c. virtual content a. True a) True 3) Describe the relationships and differences between hackers and viruses.(CH#9) c. the understanding of technology d. user-generated content b. False b) False  Hackers :are experts in technology who use their knowledge to break into computers and computer networks, either d. the verbalization of information governance in a company's policies and procedures 11) URLs use domain names to identify particular websites 12) Which of the following terms could you use synonymously when referring to the web? for profit or just for the challenge. 6) BI tools also have search features that either use a special query language (SQL, usually pronounced “sequel”) engine or a 3) Which of the following clauses is typically contained in an acceptable use policy?  A virus is software written with malicious intent to cause annoyance or damage a. URL, domain name natural language search engine. a) True a. nonrepudiation clause b. network, paradigm shift a. True b) False b. digital trust clause c. HTML, Internet b. False c. confidentiality clause d. All of the answers are correct. 7) A bit (short for binary digit) is the smallest element of data and has a value of either 0 or 1. d. employee use clause 1|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 2|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 3|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 4|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 5|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 a. True 20) The Innovator’s Dilemma, a book by Clayton Christensen, discusses how established companies can take advantage of 8) Which of the following is the correct list of the six different types of hackers listed in your text? 17) Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles’ 4) Describe the key benefits of Cloud Computing: b. False disruptive technologies without hindering existing relationships with customers, partners, and stakeholders. a. black-hat, crackers, cyberterrorists, hacktivists, script-kiddies, and white-hat- largest clients is CheckMd, which holds and authenticates customer reviews of doctors and dentists online. Having a third 1) Accessibility: Cloud computing allows users to access virtual applications software, such as database software, through a. True b. black-top, cookie, script-kiddies, environment, web 3.0, and white-top party validating the reviews is critical to CheckMd’s success. What type of authentication technique is VeriSign providing for the Internet. This allows for access to more resources 8) Content providers are companies that generate revenue by providing digital content such as news, music, photos, or videos b. False c. black-hat, script-kiddies, script bats, spider crawlers, ad spiders, and white-hat CheckMD ‫ركزوا ع الكي وورد‬ 2) Security: Cloud providers offer robust security measures to secure and protect data and examples include Netflix and Spotify. a. Firewall a. True b. certificate authority 3) Scalability: Users can easily change the amount of storage required –either increase or decrease according to PART II: Multiple Choices (1Mx15Q = 15 Marks) 9) What is Data analytics? c. online certificate requirements b. False a. are used to convey meaning from Big Data analytics to managers who need to make decisions based on this data. d. digital content certificate 4) Cost-effective:Cloud storage can eliminate the need for physical storage devices and users only pay for the storage 1) Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving 9) Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file. b. The human, structural, and recorded resources available to the organization. needed. in the information age are doomed to extinction? 18) False information about the COVID-19 vaccine or about 5G allegedly causing cancer are two examples of ________ spread a. True c. refers to the technology and processes used to gain intelligent, usable information from these databases. a. collective intelligence through the Internet.? 5) Automatic backups: Many cloud storage providers will offer automatic backups to the data ensuring work is protected. b. False d. assist managers by examining large quantities of data and parsing it into usable information b. digital Darwinism- a. snackable conten 6) Collaboration:Share folders and files with others easily and work together more seamlessly to prevent version issues with 10) Dynamic scaling which means the MIS infrastructure can be automatically scaled up or down based on requirements. c. joint venture 10) What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to “confirm” their b. the net neutrality affect files a. True account information? c. misinformation 2) Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of 5) Advantages of Utility computing models: b. False a. pharming d. asynchronous communication a company, individual, product, or brand? 1. Flexibility: Resources are allocated on demand. b. phishing a. social media monitoring 2. Reliability: Ensures high availability and reliability with redundancy, failover mechanisms, and backup systems 11) Ebusiness is something that a business can just go out and buy. c. phishing expedition PART III: Essay Questions b. social media manager to minimize downtime and ensure business continuity. a. True d. vishing c. social media policy Ch#6 b. False 3. Cost Efficiency: Organizations can avoid the upfront costs associated with building and maintaining their d. information privacy manager 11) Which of the following represent human-generated unstructured data? 1) Define cloud computing infrastructure by adopting utility computing. 12) One Megabyte (MB) equal million bytes 3) What includes governments that are after some form of information about other governments? a. text messages  Cloud computing: stores, manages, and processes data and applications over the Internet rather than on a personal 4. Scalability: Users can scale computing resources up or down based on demand. a. True a. network behavior analysis b. social media data computer or server. b. False b. cyber-vigilantes c. emails o examples of cloud computing in action are: 6) Understand cloud storage and identify key examples c. cyberterrorism d. All of the answers are correct. 1. Email: Gmail and Outlook where your emails are stored on remote servers.  Cloud storage :is a type of data storage where digital data is stored on remote servers maintained by a third-party 13) Information richness measures the number of people a firm can communicate with all over the world. d. cyber-espionage- 2. Streaming services: Netflix and Spotify deliver media content over the internet provider. This provider is responsible for hosting, managing, and securing the data stored on its infrastructure. a. True 12) What type of structured data includes sensor data, point-of-sale data, and web log data? 2) List Cloud Providers o Key Examples of Cloud Storage Provider: Google Drive , Dropbox, OneDrive (Microsoft), iCloud (Apple) b. False 4) What occurs when a new radical form of business enters the market that reshapes the way companies and organizations a. machine-generated behave? 1) AmazonCloud Drive, Cloud Player, Amazon Prime 7) List and describe the three most popular cloud computing delivery models b. human-generated 2) AppleiCloud, iWork, iBooks, iTunes 14) A fact is the confirmation or validation of an event or object. In the past, people primarily learned facts from books. a. domain name c. collective intelligence 1) Infrastructure as a Service (IaaS) :Offers computer hardware and networking equipment on a pay-per-use basis 3) GoogleGoogle Apps, Google Drive, Gmail, Google Calendar o Ex:: Amazon Ec2, Rackspace, Vmware, Google Cloud Storage a. True b. domain name hosting 4) MicrosoftOffice 365, OneDrive, OneNote, Exchange b. False c. click-thru 13) Which key benefits of Cloud Computing? 2) Software as a Service (SaaS):Offers applications on a pay-per-use basis d. paradigm shift a. accessibility, security, Scalability, Cost-effectivey, Automatic backup and Collaboration o Ex: Saleforce.com, Google Apps, Zoho, Hotmail 15) Salesforce.com is one of the most popular SaaS providers. 3) Advantages of Cloud Computing: ‫مهم جد ًا‬ b. backup and recovery plan, disaster recovery plan, and business continuity planning a. True 1) Accessibility 3) Platform as a Service (PaaS):Offers hardware, networking, and application on a pay-per-use basis 5) What is a hashtag? c. grid computing, cloud computing, and virtualization b. False 2) Availability o Ex: Google Application Engine, Windows Azure, Amazon Elastic a. represents the interconnection of relationships in a social network d. storage, network, and server virtualization 3) Cost Saving 16) Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and b. a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#) 8) SaaS extensions include: 4) Flexibility not to be observed without your consent. c. maps group contacts, identifying who knows each other and who works together 14) Which term describes the WWW during its first few years of operation between 1991 and 2003??  Data as a Service (DaaS): Facilitates the accessibility of business-critical data in a timely, secure, and affordable 5) Reliability a. True d. describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for a. eshop manner. 6) Portability b. False future navigation, filtering, or search b. Web 1.0 7) Capacity on Demand  Security as a Service (SaaS): Involves applications such as anti-virus software delivered over the Internet with c. open source 8) Backup /Recovery constant virus definition updates that are not reliant on user compliance. 17) Order date, amount sold, and customer number are all forms of data. 6) What occurs when each customer or tenant must purchase and maintain an individual system? 9) Scalability EX: Cisco, McAfee, and Symantec a. True a. multi-tenancy 15) Universities were among some of the first users of the Internet. What was the Internet first called? b. False b. single-tenancy a. HTML CH#7 c. noisy neighbor b. ARPANET 9) Identify the differences between structured and unstructured data 18) BYOD policies offer four basic options, including unlimited access for personal devices; access only to nonsensitive systems c. OPT d. rapid elasticity.  Structured data: Has a defined length, type, and format and includes numbers, dates, or strings such as Customer and data; access, but with IT control over personal devices, apps, and stored data; and access, but preventing local storage of Address forma data on personal devices. a. True ‫زيادة لان مهميين‬  Unstructured data :Not defined, does not follow a specified format, and is typically free-form text such as emails, 7) What is a collection of large, complex datasets, including structured and unstructured data, which cannot be analyzed using 16) The most secure procedures combine which of the following authentication and authorization techniques? Twitter tweets, and text messages does not follow a specified format b. False traditional database methods and tools?? a. something the user knows, such as a user ID and password a. big data 10) The sources of structured data include: ‫مهم جد ًا‬ 19) Knowledge can be a real competitive advantage for an organization. The most common form of collective intelligence found b. something the user has, such as a smart card or token b. data scientist 1. Machine-generated data : Created by a machine without human intervention. includes sensor data, point-of-sale inside the organization is knowledge management (KM), which involves capturing, classifying, evaluating, retrieving, and c. something that is part of the user, such as a fingerprint or voice signature c. data analyst data, and web log data. sharing information assets in a way that provides context for effective decisions and actions.. d. All of the answers are correct. a. True d. descriptive analytics 2. Human-generated data : Data that humans, in interaction with computers, generat includes input data, clickstream b. False data, or gaming data. 6|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 7|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 8|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 9|Page ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ 10 | P a g e ‫النوتات ليس مجانية يحرم مشاركتها مع احد او بيعها بأي شكل من االشكال‬ DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 DONE BY : Jenan haider ITIS204- Mock Exam-Final First semester 2024-2025 11) The sources of unstructured data include: ‫مهم جد ًا‬ 20) There are three main drivers of the DTC sales channels : ‫تكملة الملخص‬ 1. Machine-generated unstructured data : Such as satellite images, scientific atmosphere data, and radar data CH#9 33) Provide an example of each of the three primary information security areas: ‫مهم يتكرر‬ 1) Customer Experience. ACyberattacks have the following attributes: (essay) ‫مهم‬ (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response. 2. Human-generated unstructured data:Such as text messages, social media data, and email 2) Data Collection. 1. Use computers, mobile phones, gaming systems, and other devices. 28) The protection of customers’ privacy and data is one of the largest and murkiest ethical issues facing organizations 12) Describe the Four Common Characteristics of Big Data ‫مهم جد ًا يتكرر‬ 3) Reduced Costs 2. Include identity theft. today 1. Authentication and authorization: 1. Variety:Different forms of structured and unstructured data 3. Block your access or delete your personal documents and pictures. 21) Explain Web 2.0 and identify its Four Characteristics of Business 2.0: ‫يتكرر‬ Authentication :is a method for confirming users’ identities. 2. Veracity : The uncertainty of data, including biases, noise, and abnormalities Confidentiality: The assurance that messages and information remain available only to those authorized to view  4. Target children.  Web 2.0 (Business 2.0): The next generation of Internet use – a more mature, distinctive communications platform them. Explain: Once a system determines the authentication of a user, it can then determine the access privileges (or 3. Volume: The scale of data

Use Quizgecko on...
Browser
Browser