Questions (All) With Actual Detailed
Solutions 2025-2026 Updated.
Which type of computer runs a network operating system (NOS)? - Answer a server
Which type of software is designed to easily generate Gantt charts? - Answer Project
management software
What term refers specifically to the physical aspects of a computer such as circuit boards,
processor chips, memory, and keyboards? - Answer hardware
Which application software features tables, records, and fields that can be queried, updated,
and managed by users, programmers, and business analysts? - Answer Database software
Which term refers to any person in a business who uses a computer to complete their day to
day tasks of the business? - Answer End User
What is the main purpose of a firewall? - Answer To prevent unauthorized users from
accessing the network.
A large company has decided to invest in new IT systems, including a new server. Which IT
professional should be tasked with setting up and maintaining the server? - Answer
Computer System Administrator
A small business has a single network that allows every employee to connect through a central
server when they are in the company's main office. What type of network is the business using?
- Answer Local area network (LAN)
What term refers to the study, design, development, implementation, support, and
management of computer-based information systems? - Answer Information Technology
An employee receives an email that appears to be from the IT department. The email asks the
recipient to click a link to verify their username and password. Upon closer inspection, the
employee realizes that the email is a fraudulent attempt to obtain their password. What type of
fraud does this email represent? - Answer Phishing
Which type of data are referred to as "decayed"? - Answer Data that have become outdated
,An analyst uses software to analyze data in the company's data warehouse and produce
information to guide the organization. The information is presented in clearly understandable
charts and graphs on a dashboard and is used to inform decisions in the organization. Which
type of software is this analyst using? - Answer Business intelligence software
A database manager is setting up a relational database. The manager creates a field in a table
that links to the primary key in a different table in the database. What is this field called? -
Answer Foreign Key
Which level of security is required to protect the hardware and communications equipment that
support a database? - Answer System-level security
A data analyst is using the ETL process to enter data into the company's relational database. The
data contain many redundancies. Which process will the data analyst need to use before
loading the extracted data into the database? - Answer Normalization
A large company uses a system that provides information to its suppliers to maintain the supply
chain process.
Which type of system is this company using? - Answer Extranet
A company's IT department is currently a subunit of the accounting department, reporting to
the accounting manager. The reason for this is that accounting is the single largest consumer of
the company's IT services. The company's president decides that due to widespread
disorganization and poor communication, she wants to reorganize all business units.
What is the best recommendation for placement of IT within the company? - Answer Make
the IT department independent
Which function of a customer relationship management system helps a company identify
opportunities to increase its business? - Answer Strategy
A company makes personal computers and sells them directly to the public. At present, all
business processes are completed manually by employees, lengthening the time from customer
order to shipment.
Which business process would deliver the most immediate customer satisfaction and reduced
costs if automated? - Answer Transaction processing
Which function or feature has allowed mobile phones to replace PCs for many small-business
functions? - Answer Mobile Apps
Jack meets with the university dean to discuss his 18-year-old son's progress. Jack's son is a
freshman at the university. Jack wants to know if his son is performing well in his classes. The
, dean has access to the computer systems containing the academic records for Jack's son but is
also aware of constraints set by the Family Educational Rights and Privacy Act (FERPA).
What should the dean do? - Answer Share the records only after receiving authorization
from Jack's son.
Which advantage does a business gain by using cloud web hosting (CWH) rather than local
hosting? - Answer Cost Savings
Businesses are expected to comply with ethical business practices in every department.
What is an example of an information technology (IT) business practice that promotes ethical
behavior? - Answer Auditing to remove unlicensed software
Which technology necessitated the development and implementation of Internet Protocol
version 6 (IPv6)? - Answer IoT (IPv6)
Which core business department is primarily responsible for business intelligence? - Answer
Research and development
Delivery drones do not depend on guidance by a human but on information technology systems
to run autonomously.
Which key network system would a self-guided drone system rely on? - Answer GPS
Maria designs a website for her small business using a browser-based web development
platform. She copies an image file of a large company's logo and places the words "Just Buy It"
underneath the logo. She places the logo prominently on her website.
Which intellectual property law does Maria's website violate? - Answer Trademark(Maria)
Which network information is needed to connect an Internet of Things (IoT) device? - Answer
WI-FI connection information
What is the major issue that hinders the effective use of decision support systems (DSS)? -
Answer The collection of too much data
A transaction processing system (TPS) enables the entry and recording of sale-related data such
as item purchased, price, and date and time of sale.
Which kind of decisions does management use these data for? - Answer Tactical decisions
Which technology is a critical component of customer relationship management (CRM)
systems? - Answer the Database