CIS 105 EXAM//WITH QUESTIONS AND CORRECT ANSWERS
//VERIFIED ANSWERS GRADED A+// LATEST UPDATE
2024/2025
Which of the following is NOT an example of a paradigm shift? -
CORRECT ANSWER : Google Live
What is the foundation required for executives to make sound
technology decisions? - CORRECT ANSWER : Behavioral, technical,
business, and management theories about the components and roles of
information systems
People that use computers are called ________. - CORRECT
ANSWER : End-users
Which of the following is a component of IT? - CORRECT ANSWER
: Laptops
Smartphones
Macs
(All of the above)
What is an example of a core competency? - CORRECT ANSWER :
Superior marketing skills
Computer competency is best developed through ________. -
CORRECT ANSWER : Critical Thinking
,What is accomplished by using a best practice? - CORRECT
ANSWER : Optimizing the way to accomplish a task
A computer application enhances competency through ________. -
CORRECT ANSWER : Allowing for practical use
What is the function of the Sarbanes-Oxley Act of 2002? - CORRECT
ANSWER : It protects investors from fraud.
Gordon Moore made which of the following observations? -
CORRECT ANSWER : Computing power doubles every 18 months
The first person to buy a recently released PC is known as ________. -
CORRECT ANSWER : An early adopter
Which of the following is a major difference between application
software and system software? - CORRECT ANSWER : Application
software is used by the end-user, whereas system software controls
peripherals.
A computer network consists of which of the following? - CORRECT
ANSWER : Routers
Switches
Communication links
(All of the above)
, Business intranets are secured via ________. - CORRECT ANSWER :
Both hardware and software firewalls
________ are responsible for establishing and incorporating security
policies and procedures in business intranets. - CORRECT ANSWER :
Network administrators
True or false: Application software is chosen by the user. - CORRECT
ANSWER : True
Which of the following is NOT application software? - CORRECT
ANSWER : Virus protection software
Word processing software and spreadsheet software are usually sold
together as a ___________________. - CORRECT ANSWER :
Productivity suite
Which of the following is the term for copying an area from one
application and inserting it into another application? - CORRECT
ANSWER : Object embedding
True or false: Within a spreadsheet, rows are labeled with letters, and
columns are labeled with numbers. - CORRECT ANSWER : False
//VERIFIED ANSWERS GRADED A+// LATEST UPDATE
2024/2025
Which of the following is NOT an example of a paradigm shift? -
CORRECT ANSWER : Google Live
What is the foundation required for executives to make sound
technology decisions? - CORRECT ANSWER : Behavioral, technical,
business, and management theories about the components and roles of
information systems
People that use computers are called ________. - CORRECT
ANSWER : End-users
Which of the following is a component of IT? - CORRECT ANSWER
: Laptops
Smartphones
Macs
(All of the above)
What is an example of a core competency? - CORRECT ANSWER :
Superior marketing skills
Computer competency is best developed through ________. -
CORRECT ANSWER : Critical Thinking
,What is accomplished by using a best practice? - CORRECT
ANSWER : Optimizing the way to accomplish a task
A computer application enhances competency through ________. -
CORRECT ANSWER : Allowing for practical use
What is the function of the Sarbanes-Oxley Act of 2002? - CORRECT
ANSWER : It protects investors from fraud.
Gordon Moore made which of the following observations? -
CORRECT ANSWER : Computing power doubles every 18 months
The first person to buy a recently released PC is known as ________. -
CORRECT ANSWER : An early adopter
Which of the following is a major difference between application
software and system software? - CORRECT ANSWER : Application
software is used by the end-user, whereas system software controls
peripherals.
A computer network consists of which of the following? - CORRECT
ANSWER : Routers
Switches
Communication links
(All of the above)
, Business intranets are secured via ________. - CORRECT ANSWER :
Both hardware and software firewalls
________ are responsible for establishing and incorporating security
policies and procedures in business intranets. - CORRECT ANSWER :
Network administrators
True or false: Application software is chosen by the user. - CORRECT
ANSWER : True
Which of the following is NOT application software? - CORRECT
ANSWER : Virus protection software
Word processing software and spreadsheet software are usually sold
together as a ___________________. - CORRECT ANSWER :
Productivity suite
Which of the following is the term for copying an area from one
application and inserting it into another application? - CORRECT
ANSWER : Object embedding
True or false: Within a spreadsheet, rows are labeled with letters, and
columns are labeled with numbers. - CORRECT ANSWER : False