Q.1
A ___ is a binary event representing a signal change from positive to negative
Q.2
Which type of system tracks day-to-day activities of an organization?
Q.3
____________ is a plastic card with a built-in microprocessor, used typically to perform financial transactions.
Q.4
_______ type of cables uses the copper wire for data transmission
Q.5
In database, table is made of _______.
Q.6
_______is (are) the important component(s) of DSS.
Q.7
Medium bans channels use ____ type of cables used for transmissions.
Q.8
Which of the following consists of all the hardware and software that a firm needs to achieve its business objectives?
Q.9
This type of encryption verifies the origin and content of a message and provides a way to associate a message with a sender is _________________.
Q.10
______ type of cables need minimum numbers of repeaters
Q.11
A formal document would be classified as __________.
Q.12
The ________ has no pre-established decision procedures.
Q.13
________ system can process data that are incomplete
Q.14
Common threats against information systems come from all of the following factors except ___________________.
Q.15
A ______ is a communication processor that connects two similar LANs
Q.16
A method of interacting with customers such as a Web site or a wireless device is called _____________.
Q.17
_____ duplex transmission can flow data in two ways but one direction at a time.
Q.18
A network of organizations used for procuring raw materials, transforming these materials into products, and distributing the products to customers is called _____________________.
Q.19
_____ configurations provide extremely a fast transmission between workstations contains only one
Q.20
Who are the people that actually use the system to perform or support the work to be completed?
Q.21
Google are using information technology to pursue this generic strategy of ____________.
Q.22
________ system uses the condition concept for processing.
Q.23
_________ is the period in days between the ordering and delivering of goods.
Q.24
Which of the following is Electronic Conference Tool(s)?
Q.25
In network the different communication are interconnected by using a communication processors called a _____.
Q.26
E-commerce is ubiquitous it reduces __________.
Q.27
In network the term protocols means ____.
Q.28
Which is not a typical business function?
Q.29
FIFO stands for ______.
Q.30
Setting up fake Web sites that look like those of legitimate businesses to ask users for confidential personal data is called__________________.
0 h : 0 m : 1 s