CIS103 Created by osama bani hamad

A visually engaging illustration of a computer network with elements representing software, databases, and cybersecurity, conveying themes of technology and information systems.

CIS103 Computer Information Systems Quiz

Test your knowledge in Computer Information Systems with our comprehensive quiz designed to challenge your understanding and application of key concepts. This quiz covers various topics, from database design to software development methodologies.

Prepare yourself with questions that will help you:

  • Understand key attributes of information systems
  • Enhance your technical knowledge in software and security
  • Learn about system development life cycles and threats to information privacy
20 Questions5 MinutesCreated by CodingTiger457
1- The Diamonds in a figure shown Represent
Optional or mandatory relationship
Relationship
Entity
ER diagram
2- Which of the following Attributes is not normalized ?
Students
Class
Materials
A+c
3- from the following figure, the primary key of material entity is
Material Name
Material istructor
Material ID
A+c
4- the summation of two primary numbers 11011101 and 1011101101 = (?) in hexadecimal number
1111001010
3CA
1712
31210
5- the 10 TB = ( ? ) KB
10*1024*1024
10/(1024*1024*1024)
10*2^30
10/2^30
6- all software existing and potential in an organization means :
Application portfolio
Organization's Application
Joint Application Design
Prototypes
7- Provide the software for the organizations as a service over network, indicate
Software as a Service
Application Service provider
Application service management
Web host
8-System Development Life Cycle is an example modern methods to Create Application.
True
False
9-The examination of the business problem that the organization plan to solve with an information system.
Testing
Debugging
Knowing user requirement
Maintenance
10- is interested in the design phase and the analysis stage only to create an application
Rapid Application Development
Agile
Computer-Assisted software engineering
Joint Application Development
11-Deliver frequent communication in rapid iterations is an example of
RAD
Agile
CASE
ICASE
12- Deliberate threat, designed to capture your sensitive information such as password and send them to creator .
Worm
Logic bomb
Trojan horse
Denial of service
13- Perpetrators attack the vulnerability before the software vendor can prepare a patch for vulnerability.
Back door
Phishing attack
Denial software
Zero day attack
14-Smaller, faster, cheaper computers and storage devices this factor leads to decrease threats of information privacy.
True
False
15-computing skills necessary to be a hacker are decreasing this factor leads to decrease threats of information privacy.
True
False
16- Occur when attacked company system use to attack another company system.
Cybercrime
Downstream liability
Unmanaged devices
Denial of service
17-insufficient funding, technological obsolescence, and lack of attention these points are related with which type of factors Increasing privacy threats.
Government legislation
Lack of management support
Downstream liability
Unmanaged devices
18-is the harm, loss or damage that can result if a threat compromises that resource.
Threat to an information
Exposure of information resources
System’s vulnerability
Risk
19-Software that gathers user information through the user’s Internet connection without their knowledge
Trojan horse
Spyware
Virus
Adware
20-Determines which actions, rights, or privileges the person has, based on verified identity.
Privacy
Authorization.
Ppplication control
Authentication.
{"name":"CIS103 Created by osama bani hamad", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge in Computer Information Systems with our comprehensive quiz designed to challenge your understanding and application of key concepts. This quiz covers various topics, from database design to software development methodologies.Prepare yourself with questions that will help you: Understand key attributes of information systemsEnhance your technical knowledge in software and securityLearn about system development life cycles and threats to information privacy","img":"https:/images/course4.png"}
Powered by: Quiz Maker