SlideShare a Scribd company logo
1 of 4
BIS 220 Final Exam
ANSWERS ARE HERE 
1)Two information systems that support the entire organization are
A. enterprise resource planning systems and dashboards
B. transaction processing systems and office automation systems
C. enterprise resource planning systems and transaction processing systems
D. expert systems and office automation systems
2) _______ is the direct use of information systems by employees in their work.
A. Transaction processing systems
B. End-user computing
C. Decision support systems
D. Management information systems
3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities.
A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems
4) ______ issues involve who may obtain information and how much they should pay for this
information.
A. Privacy
B. Accessibility
C. Property
D. Transferability
5) _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility
6) Your company’s computers have been taken over by an attacker and used to attack another
organization’s information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements
7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share
documents with coworkers, you should do which of the following?
A. Print out a backup copy of documents.
B. Run the Compatibility Checker.
C. Burn all documents to CD.
D. Create a document summary.
8) Which of the following is detected by the contextual spelling checker?
A. Duplicate words
B. Irregular capitalization
C. Use of their when you should use there
D. Improper use of commas and other punctuation
9) If your cursor is near the bottom of a page and you want to display the next paragraph you
type at the top of a new page, you should use which of the following?
A. Enter
B. Ctrl+PageDown
C. Ctrl+Enter
D. Page Layout, Breaks, Line Numbers
10) Your ______ is the collection of traceable data that is captured when you use various
information technologies such as credit cards or the Internet.
A. data profile
B. data shadow
C. database file
D. database record
11) No alphabetic characters in a social security number field is an example of
A. data isolation
B. data consistency
C. data integrity
D. data redundancy
12) In a database, the primary key field is used to
A. specify an entity
B. uniquely identify an attribute
C. identify duplicated data
D. uniquely identify a record
13) Search engines and metasearch engines are examples of which network application?
A. Communications
B. Discovery
C. Collaboration
D. Web services
14) ______ portals are used to coordinate an organization's business information internally and
externally.
A. Personal
B. Affinity
C. Corporate
D. Commercial
15) Workflow, groupware, and telepresence systems are examples of which network
application?
A. Discovery
B. Collaboration
C. Web services
D. Communications
16) Which type of e-commerce does an organization provide information and services to its
workers?
A. Business-to-employee
B. Consumer-to-business
C. Government-to-business
D. Business-to-consumer
17) _______ auctions are the most common auction model for large purchases.
A. Forward
B. Static
C. Reverse
D. Simple
18) ______ collect data from many points over an extended space.
A. Bluetooth® networks
B. Ultra-wideband networks
C. Wireless sensor networks
D. Wi-Fi networks
19) Which type of satellite has the largest footprint?
A. Low earth orbit
B. Geostationary
C. Medium earth orbit
D. Equatorial orbit
20) Which of the following is the most appropriate wireless networking standard for creating
personal area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth®
21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
A. Mixed reference
B. Absolute reference
C. Circular reference
D. Range name
22) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
A. Increase the zoom percentage.
B. Delete the column.
C. Adjust the row height.
D. Increase the column width.
23) ______ feasibility determines if the project is an acceptable financial risk and if the
organization can afford the expense and time needed to complete the project.
A. technical
B. economic
C. organizational
D. behavioral
24) In the traditional systems development life cycle, users
A. have no input
B. are important only in the testing phases of the project
C. are important only in the maintenance phase of the project
D. are limited to providing information requirements
25) To create a Microsoft® PowerPoint® presentation based on an installed template, click the
A. File tab, and then click New.
B. File tab, and then click Open.
C. Insert tab, and then select Add Template.
D. Design tab, and then select New.
26) Which of the following demotes a bullet point from the first level to the second level in
Outline view in Microsoft® PowerPoint®?
A. Shift+Tab
B. Tab
C. Decrease List Level
D. Ctrl+Tab
27) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners.
A. A global network
B. An intranet
C. An extranet
D. The Internet
28) ______ is a system with universally accepted standards for storing, retrieving, formatting,
and displaying information via a client/server architecture.
A. FTP
B. World Wide Web
C. Newsgroups
D. The Internet
29) A process that allows users to place information in multiple, overlapping associations is
called
A. AJAX
B. tagging
C. a Wiki
D. blogging
30) ________ are websites that provide collections of content from all over the World Wide
Web.
A. Aggregators
B. Social networks
C. Mashups
D. Really simple syndications

More Related Content

More from RieTian99

QNT 561 QNT/561 Final Exam 100% Correct
QNT 561 QNT/561 Final Exam 100% CorrectQNT 561 QNT/561 Final Exam 100% Correct
QNT 561 QNT/561 Final Exam 100% CorrectRieTian99
 
OPS 571 OPS/571 Final Exam 100% Correct
OPS 571 OPS/571 Final Exam 100% CorrectOPS 571 OPS/571 Final Exam 100% Correct
OPS 571 OPS/571 Final Exam 100% CorrectRieTian99
 
MKT 571 MKT/571 Final Exam 100% Correct
MKT 571 MKT/571 Final Exam 100% CorrectMKT 571 MKT/571 Final Exam 100% Correct
MKT 571 MKT/571 Final Exam 100% CorrectRieTian99
 
MGT 521 MGT/521 Final Exam 100% Correct
MGT 521 MGT/521 Final Exam 100% CorrectMGT 521 MGT/521 Final Exam 100% Correct
MGT 521 MGT/521 Final Exam 100% CorrectRieTian99
 
MGT 498 MGT/498 Final Exam 100% Correct
MGT 498 MGT/498 Final Exam 100% CorrectMGT 498 MGT/498 Final Exam 100% Correct
MGT 498 MGT/498 Final Exam 100% CorrectRieTian99
 
FIN 370 FIN/370 Final Exam 100% Correct
FIN 370 FIN/370 Final Exam 100% CorrectFIN 370 FIN/370 Final Exam 100% Correct
FIN 370 FIN/370 Final Exam 100% CorrectRieTian99
 
ACC 561 ACC/561 Final Exam 100% Correct
ACC 561 ACC/561 Final Exam 100% CorrectACC 561 ACC/561 Final Exam 100% Correct
ACC 561 ACC/561 Final Exam 100% CorrectRieTian99
 
ACC 460 ACC/460 Final Exam 100% Correct
ACC 460 ACC/460 Final Exam 100% CorrectACC 460 ACC/460 Final Exam 100% Correct
ACC 460 ACC/460 Final Exam 100% CorrectRieTian99
 
ACC 423 ACC/423 Final Exam 100% Correct
ACC 423 ACC/423 Final Exam 100% CorrectACC 423 ACC/423 Final Exam 100% Correct
ACC 423 ACC/423 Final Exam 100% CorrectRieTian99
 
ACC 422 ACC/422 Final Exam 100% Correct
ACC 422 ACC/422 Final Exam 100% CorrectACC 422 ACC/422 Final Exam 100% Correct
ACC 422 ACC/422 Final Exam 100% CorrectRieTian99
 

More from RieTian99 (10)

QNT 561 QNT/561 Final Exam 100% Correct
QNT 561 QNT/561 Final Exam 100% CorrectQNT 561 QNT/561 Final Exam 100% Correct
QNT 561 QNT/561 Final Exam 100% Correct
 
OPS 571 OPS/571 Final Exam 100% Correct
OPS 571 OPS/571 Final Exam 100% CorrectOPS 571 OPS/571 Final Exam 100% Correct
OPS 571 OPS/571 Final Exam 100% Correct
 
MKT 571 MKT/571 Final Exam 100% Correct
MKT 571 MKT/571 Final Exam 100% CorrectMKT 571 MKT/571 Final Exam 100% Correct
MKT 571 MKT/571 Final Exam 100% Correct
 
MGT 521 MGT/521 Final Exam 100% Correct
MGT 521 MGT/521 Final Exam 100% CorrectMGT 521 MGT/521 Final Exam 100% Correct
MGT 521 MGT/521 Final Exam 100% Correct
 
MGT 498 MGT/498 Final Exam 100% Correct
MGT 498 MGT/498 Final Exam 100% CorrectMGT 498 MGT/498 Final Exam 100% Correct
MGT 498 MGT/498 Final Exam 100% Correct
 
FIN 370 FIN/370 Final Exam 100% Correct
FIN 370 FIN/370 Final Exam 100% CorrectFIN 370 FIN/370 Final Exam 100% Correct
FIN 370 FIN/370 Final Exam 100% Correct
 
ACC 561 ACC/561 Final Exam 100% Correct
ACC 561 ACC/561 Final Exam 100% CorrectACC 561 ACC/561 Final Exam 100% Correct
ACC 561 ACC/561 Final Exam 100% Correct
 
ACC 460 ACC/460 Final Exam 100% Correct
ACC 460 ACC/460 Final Exam 100% CorrectACC 460 ACC/460 Final Exam 100% Correct
ACC 460 ACC/460 Final Exam 100% Correct
 
ACC 423 ACC/423 Final Exam 100% Correct
ACC 423 ACC/423 Final Exam 100% CorrectACC 423 ACC/423 Final Exam 100% Correct
ACC 423 ACC/423 Final Exam 100% Correct
 
ACC 422 ACC/422 Final Exam 100% Correct
ACC 422 ACC/422 Final Exam 100% CorrectACC 422 ACC/422 Final Exam 100% Correct
ACC 422 ACC/422 Final Exam 100% Correct
 

Recently uploaded

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

BIS 220 BIS/220 Final Exam 100% Correct

  • 1. BIS 220 Final Exam ANSWERS ARE HERE  1)Two information systems that support the entire organization are A. enterprise resource planning systems and dashboards B. transaction processing systems and office automation systems C. enterprise resource planning systems and transaction processing systems D. expert systems and office automation systems 2) _______ is the direct use of information systems by employees in their work. A. Transaction processing systems B. End-user computing C. Decision support systems D. Management information systems 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities. A. Expert systems B. Dashboards C. Business intelligence systems D. Decision support systems 4) ______ issues involve who may obtain information and how much they should pay for this information. A. Privacy B. Accessibility C. Property D. Transferability 5) _____ issues involve collecting, storing, and disseminating information about individuals. A. Privacy B. Accuracy C. Property D. Accessibility 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following? A. Poor security policies and procedures B. Lack of due diligence C. Downstream liability D. Poor service-level agreements 7) You are the only person in your office to upgrade to Microsoft® Word 2010. Before you share documents with coworkers, you should do which of the following? A. Print out a backup copy of documents. B. Run the Compatibility Checker. C. Burn all documents to CD. D. Create a document summary. 8) Which of the following is detected by the contextual spelling checker?
  • 2. A. Duplicate words B. Irregular capitalization C. Use of their when you should use there D. Improper use of commas and other punctuation 9) If your cursor is near the bottom of a page and you want to display the next paragraph you type at the top of a new page, you should use which of the following? A. Enter B. Ctrl+PageDown C. Ctrl+Enter D. Page Layout, Breaks, Line Numbers 10) Your ______ is the collection of traceable data that is captured when you use various information technologies such as credit cards or the Internet. A. data profile B. data shadow C. database file D. database record 11) No alphabetic characters in a social security number field is an example of A. data isolation B. data consistency C. data integrity D. data redundancy 12) In a database, the primary key field is used to A. specify an entity B. uniquely identify an attribute C. identify duplicated data D. uniquely identify a record 13) Search engines and metasearch engines are examples of which network application? A. Communications B. Discovery C. Collaboration D. Web services 14) ______ portals are used to coordinate an organization's business information internally and externally. A. Personal B. Affinity C. Corporate D. Commercial 15) Workflow, groupware, and telepresence systems are examples of which network application? A. Discovery B. Collaboration C. Web services D. Communications 16) Which type of e-commerce does an organization provide information and services to its workers? A. Business-to-employee B. Consumer-to-business C. Government-to-business D. Business-to-consumer
  • 3. 17) _______ auctions are the most common auction model for large purchases. A. Forward B. Static C. Reverse D. Simple 18) ______ collect data from many points over an extended space. A. Bluetooth® networks B. Ultra-wideband networks C. Wireless sensor networks D. Wi-Fi networks 19) Which type of satellite has the largest footprint? A. Low earth orbit B. Geostationary C. Medium earth orbit D. Equatorial orbit 20) Which of the following is the most appropriate wireless networking standard for creating personal area networks? A. Wi-Fi B. Cellular radio C. Microwave D. Bluetooth® 21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula? A. Mixed reference B. Absolute reference C. Circular reference D. Range name 22) What should you do if you see a column of pound signs (###) instead of values or results of formulas? A. Increase the zoom percentage. B. Delete the column. C. Adjust the row height. D. Increase the column width. 23) ______ feasibility determines if the project is an acceptable financial risk and if the organization can afford the expense and time needed to complete the project. A. technical B. economic C. organizational D. behavioral 24) In the traditional systems development life cycle, users A. have no input B. are important only in the testing phases of the project C. are important only in the maintenance phase of the project D. are limited to providing information requirements 25) To create a Microsoft® PowerPoint® presentation based on an installed template, click the A. File tab, and then click New. B. File tab, and then click Open. C. Insert tab, and then select Add Template. D. Design tab, and then select New.
  • 4. 26) Which of the following demotes a bullet point from the first level to the second level in Outline view in Microsoft® PowerPoint®? A. Shift+Tab B. Tab C. Decrease List Level D. Ctrl+Tab 27) ________ connects parts of the intranets of different organizations and allows secure communications among business partners. A. A global network B. An intranet C. An extranet D. The Internet 28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture. A. FTP B. World Wide Web C. Newsgroups D. The Internet 29) A process that allows users to place information in multiple, overlapping associations is called A. AJAX B. tagging C. a Wiki D. blogging 30) ________ are websites that provide collections of content from all over the World Wide Web. A. Aggregators B. Social networks C. Mashups D. Really simple syndications