Information Systems and Computer Applications
CLEP Exam — Hardware, software, networks, databases, IS in organizations, and programming concepts
Exam Overview
About This Exam
The CLEP Information Systems and Computer Applications exam covers material typically found in a one-semester introductory course. It tests knowledge of computer hardware and software, data communications, database concepts, systems analysis and design, the role of information systems in organizations, programming logic, and the social/ethical implications of technology.
Content Breakdown
- Computer Hardware & Systems (~20%): CPU, memory, storage devices, input/output peripherals, number systems
- Software & Operating Systems (~18%): OS functions, application software categories, software development lifecycle, productivity tools
- Networks & the Internet (~18%): Network types, topologies, protocols, TCP/IP, internet services, wireless, cloud computing
- Information Systems in Organizations (~18%): TPS, MIS, DSS, ERP, CRM, systems development lifecycle (SDLC)
- Databases & Data Management (~14%): Relational model, SQL, ER diagrams, normalization, data warehousing, big data
- Programming, Security & Ethics (~12%): Algorithms, flowcharts, programming paradigms, cybersecurity, privacy, intellectual property
Exam Tips
- Know the core hardware components and what each does — CPU, RAM, ROM, secondary storage, I/O
- Understand the difference between systems software (OS) and application software
- Be able to distinguish network types (LAN, WAN, MAN) and topologies (star, bus, ring, mesh)
- Memorize the types of information systems (TPS → MIS → DSS → ESS) and their users
- Know relational database concepts: primary key, foreign key, SQL SELECT basics, normalization
- Understand basic programming logic: flowchart symbols, sequence/selection/repetition structures
- Know the major cybersecurity threats (malware, phishing, DoS) and countermeasures
Computer Hardware & Systems
~20%The Central Processing Unit (CPU)
The CPU is the "brain" of the computer — it executes instructions and processes data. Modern CPUs consist of:
- Arithmetic Logic Unit (ALU): Performs arithmetic (+, −, ×, ÷) and logical (AND, OR, NOT) operations
- Control Unit (CU): Fetches, decodes, and executes instructions; coordinates all hardware components
- Registers: Ultra-fast, temporary storage inside the CPU for data being processed
- Cache memory: Small, fast memory between CPU and RAM; L1, L2, L3 levels
CPU Performance Factors
- Clock speed (GHz): Number of instruction cycles per second; higher = faster
- Cores: Multiple cores allow parallel processing (dual-core, quad-core, etc.)
- Word size: Number of bits processed per cycle — 64-bit is standard today
- Pipeline: Overlapping stages of instruction execution for efficiency
Memory
Primary Storage (Main Memory)
- RAM (Random Access Memory): Volatile (lost when power off); holds programs and data currently in use; directly accessible by CPU
- ROM (Read-Only Memory): Non-volatile; holds permanent instructions (BIOS/firmware); cannot be easily modified
- DRAM vs. SRAM: DRAM needs periodic refreshing; SRAM is faster but more expensive (used in cache)
Secondary Storage (Persistent Storage)
- HDD (Hard Disk Drive): Magnetic platters; high capacity; slower; moving parts
- SSD (Solid State Drive): Flash memory; faster, more durable, no moving parts; higher cost per GB
- Optical discs: CD, DVD, Blu-ray — laser reads/writes data
- Flash drives (USB): Portable solid-state storage
- Cloud storage: Remote servers accessed over the internet
Memory Hierarchy
From fastest/most expensive to slowest/cheapest: Registers → Cache → RAM → SSD → HDD → Optical → Tape.
Input and Output Devices
Input Devices
- Keyboard, mouse, touchscreen, scanner, microphone, webcam, barcode reader, RFID reader
Output Devices
- Monitor (LCD, OLED), printer (laser, inkjet, 3D), speakers, projector
- Resolution: Number of pixels on screen; higher = sharper image
I/O Interfaces and Buses
- USB (Universal Serial Bus): Most common peripheral interface; plug-and-play
- HDMI / DisplayPort: High-definition video/audio output
- System bus: Internal pathway connecting CPU, memory, and I/O — data bus, address bus, control bus
Number Systems and Data Representation
- Bit: Smallest unit of data — binary digit (0 or 1)
- Byte: 8 bits; represents one character
- Kilobyte (KB): 1,024 bytes; Megabyte (MB): 1,024 KB; Gigabyte (GB): 1,024 MB; Terabyte (TB): 1,024 GB
- Binary (base 2): Uses only 0s and 1s; native language of computers
- Hexadecimal (base 16): Uses 0–9 and A–F; compact representation of binary (e.g., colors in web design)
- ASCII: 7-bit standard code for characters; Unicode (UTF-8) extends this to all world languages
- Moore's Law: Gordon Moore's observation that the number of transistors on a microchip doubles approximately every two years, leading to exponential performance gains
Software & Operating Systems
~18%Types of Software
Software is the set of instructions that directs hardware to perform tasks. It is broadly divided into systems software and application software.
Systems Software
- Operating System (OS): Manages hardware resources, provides user interface, runs applications — examples: Windows, macOS, Linux, Android, iOS
- Utility programs: Antivirus, disk defragmenter, backup software, file compression
- Device drivers: Software that allows the OS to communicate with specific hardware devices
- Firmware: Permanent software embedded in hardware (BIOS/UEFI in motherboard)
Application Software
- Productivity software: Word processing (MS Word), spreadsheets (Excel), presentation (PowerPoint), database (Access)
- Business software: ERP, CRM, accounting software
- Web browsers: Chrome, Firefox, Safari, Edge
- Communication: Email clients, video conferencing (Zoom, Teams)
- Creative: Image editing (Photoshop), video editing, CAD
Operating System Functions
- Process management: CPU scheduling; manages running programs (processes/threads)
- Memory management: Allocates RAM to programs; virtual memory uses disk to extend RAM
- File management: Organizes files into directories/folders; file system (NTFS, FAT, ext4)
- I/O management: Coordinates device communication through device drivers
- Security and access control: User authentication, permissions, encryption
- User interface: GUI (graphical, windows/icons/menus) vs. CLI (command-line interface)
Multitasking and Multithreading
- Multitasking: OS runs multiple programs by rapidly switching CPU attention among them (time-sharing)
- Multiprocessing: Using two or more CPUs to run programs simultaneously
- Multithreading: A single program runs multiple threads (sub-tasks) simultaneously
Software Licensing and Distribution
- Proprietary software: Owned by a company; users pay for a license; source code is not public (Microsoft Office)
- Open-source software: Source code freely available; community developed (Linux, Firefox, LibreOffice)
- Freeware: Free to use but source code not available
- Shareware: Free trial period, then requires payment
- SaaS (Software as a Service): Accessed via web browser, subscription-based (Salesforce, Google Workspace)
Software Development
- Waterfall model: Sequential phases: requirements → design → implementation → testing → deployment → maintenance
- Agile methodology: Iterative, incremental development; sprints; responds to change; Scrum and Kanban frameworks
- DevOps: Combining development and operations for continuous integration/continuous delivery (CI/CD)
Networks & the Internet
~18%Network Types and Topologies
Types by Geographic Scope
- PAN (Personal Area Network): Very short range — Bluetooth devices
- LAN (Local Area Network): Single building or campus; owned by organization; high speed (Ethernet)
- MAN (Metropolitan Area Network): City-wide; interconnects LANs
- WAN (Wide Area Network): Spans large geographic areas; uses public networks; the internet is the largest WAN
Network Topologies
- Star: All devices connect to a central hub/switch; most common in LANs; hub failure = network down
- Bus: All devices share one backbone cable; simple but collision-prone; a single break disrupts all
- Ring: Data travels in one direction around a ring; each node passes data to the next
- Mesh: Every device connects to every other; redundant and fault-tolerant; expensive
- Hybrid: Combination of topologies (most real networks)
Network Hardware and Protocols
Key Hardware
- NIC (Network Interface Card): Hardware that connects a device to a network
- Hub: Broadcasts data to all devices; "dumb" device; replaced by switches
- Switch: Directs data only to the intended recipient; more efficient than hubs
- Router: Connects networks; directs packets between networks using IP addresses
- Modem: Converts digital signals to analog (and back) for transmission over phone/cable lines
- Access Point (WAP): Provides wireless LAN connectivity
- Firewall: Monitors and filters incoming/outgoing traffic based on security rules
Network Protocols
- TCP/IP: Foundation of the internet; TCP handles reliable delivery; IP handles addressing and routing
- HTTP/HTTPS: Web page transfer; HTTPS adds SSL/TLS encryption
- FTP: File Transfer Protocol; transfers files between computers
- SMTP/POP3/IMAP: Email sending (SMTP), receiving (POP3 downloads; IMAP syncs)
- DNS (Domain Name System): Translates domain names (google.com) to IP addresses
- DHCP: Automatically assigns IP addresses to devices on a network
The Internet and World Wide Web
The internet is a global network of interconnected networks using TCP/IP. The World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the internet — invented by Tim Berners-Lee in 1989–1991.
Internet Addressing
- IP address: Unique numerical identifier for each device — IPv4 (32-bit, e.g., 192.168.1.1) and IPv6 (128-bit)
- URL (Uniform Resource Locator): Web address — protocol://domain/path (https://example.com/page)
- Domain name: Human-readable address; top-level domains (.com, .org, .edu, .gov)
Web Technologies
- HTML: HyperText Markup Language — defines structure of web pages
- CSS: Cascading Style Sheets — defines presentation/styling
- JavaScript: Client-side scripting for interactive web pages
- XML/JSON: Data interchange formats
Cloud Computing
- IaaS (Infrastructure as a Service): Virtual machines, storage, networking (AWS EC2)
- PaaS (Platform as a Service): Development platform, middleware (Google App Engine)
- SaaS (Software as a Service): Full application over the internet (Gmail, Salesforce)
- Public, private, hybrid clouds
Wireless Technologies
- Wi-Fi (802.11): Wireless LAN; standards: 802.11n, 802.11ac (Wi-Fi 5), 802.11ax (Wi-Fi 6)
- Bluetooth: Short-range wireless; PAN connectivity
- 4G/5G cellular: Mobile broadband
- NFC (Near Field Communication): Very short-range — contactless payments
Information Systems in Organizations
~18%Types of Information Systems
Different levels of an organization need different types of information systems. They form a hierarchy from operational to strategic.
- TPS (Transaction Processing System): Captures and processes routine daily transactions (sales, payroll, orders); operational level; provides raw data to other systems
- MIS (Management Information System): Produces periodic reports from TPS data to support structured decisions by middle managers (sales summaries, inventory reports)
- DSS (Decision Support System): Helps managers with semi-structured decisions by allowing "what-if" analysis; uses models and interactive queries
- ESS/EIS (Executive Support/Information System): Supports unstructured strategic decisions by top executives; dashboards, aggregate external and internal data
- Expert System (ES): AI-based system that captures expert knowledge and applies it to specific problem domains
- KMS (Knowledge Management System): Captures, organizes, and shares organizational knowledge and best practices
Enterprise Systems
ERP (Enterprise Resource Planning)
An ERP integrates all functional areas of an enterprise (finance, HR, manufacturing, supply chain, sales) into one unified system with a central database. Benefits: eliminates data silos, improves coordination, real-time information. Example: SAP, Oracle ERP.
CRM (Customer Relationship Management)
Systems that manage all aspects of customer interaction — tracking leads, sales history, support tickets, marketing campaigns. Goal: maximize customer lifetime value. Examples: Salesforce, HubSpot.
SCM (Supply Chain Management Systems)
Manage the flow of materials, information, and money from suppliers through production to customers. Includes procurement, inventory, logistics, and demand forecasting.
Systems Development Life Cycle (SDLC)
The SDLC is a structured process for planning, creating, testing, and deploying an information system.
- Planning: Identify the problem, feasibility study (technical, economic, operational), project scope
- Systems Analysis: Study existing system, gather requirements, document user needs — produces requirements specification
- Systems Design: Logical design (what the system will do) and physical design (how it will do it) — data models, interface mockups
- Development/Implementation: Write code, configure software, create database
- Testing: Unit, integration, and user acceptance testing (UAT)
- Deployment: Install and convert to new system — direct cutover, parallel conversion, phased conversion, pilot conversion
- Maintenance: Ongoing support, bug fixes, enhancements
Systems Analysis Tools
- DFD (Data Flow Diagram): Shows how data moves through a system; processes, data stores, entities, data flows
- ERD (Entity-Relationship Diagram): Models data and relationships between entities
- Use case diagram: Shows interactions between users (actors) and the system
- Structured interviews, surveys, observation, document review
Business Intelligence and Analytics
- Business Intelligence (BI): Tools and processes for collecting, integrating, analyzing, and presenting business data to support decision-making
- Data warehouse: Large repository of integrated historical data from multiple sources, optimized for querying and analysis (not transaction processing)
- OLAP (Online Analytical Processing): Multidimensional analysis — "drill down," "roll up," "slice and dice" data cubes
- Data mining: Discovering patterns and relationships in large datasets using statistical and machine learning techniques
- Dashboards and scorecards: Real-time visual displays of key performance indicators (KPIs)
- Big data: Datasets characterized by the 3 Vs — Volume (massive size), Velocity (generated rapidly), Variety (structured and unstructured)
Databases & Data Management
~14%Database Fundamentals
A database is an organized collection of related data. A DBMS (Database Management System) is software that creates, manages, and provides access to databases — examples: Oracle, MySQL, PostgreSQL, Microsoft SQL Server, SQLite.
Advantages of DBMS Over File-Based Systems
- Reduces data redundancy and inconsistency
- Enables data sharing across applications
- Enforces data integrity and security
- Supports concurrent access by multiple users
- Provides backup and recovery
The Relational Database Model
Developed by Edgar F. Codd (1970), the relational model organizes data into tables (relations) of rows and columns — the dominant database model.
Key Relational Concepts
- Table (relation): A set of rows and columns; each table represents one entity type
- Row (record/tuple): One instance of the entity
- Column (field/attribute): One characteristic of the entity; has a data type (int, varchar, date)
- Primary key: Column(s) that uniquely identify each row; cannot be null or duplicate
- Foreign key: Column that references the primary key of another table; enforces referential integrity
- Relationship types: One-to-one, one-to-many, many-to-many (requires a junction table)
Normalization
Normalization organizes tables to reduce redundancy and improve data integrity:
- 1NF (First Normal Form): Eliminate repeating groups; each column has atomic values
- 2NF (Second Normal Form): 1NF + no partial dependencies (every non-key attribute depends on the whole primary key)
- 3NF (Third Normal Form): 2NF + no transitive dependencies (non-key attributes depend only on the primary key, not on other non-key attributes)
SQL (Structured Query Language)
SQL is the standard language for relational databases. It has four main categories:
Data Manipulation Language (DML)
- SELECT: Retrieve data — SELECT columns FROM table WHERE condition ORDER BY column
- INSERT: Add new rows
- UPDATE: Modify existing rows
- DELETE: Remove rows
Data Definition Language (DDL)
- CREATE TABLE: Define new table structure
- ALTER TABLE: Modify table structure
- DROP TABLE: Delete a table
SQL Clauses and Functions
- WHERE: Filters rows by condition
- JOIN: Combines rows from two tables based on a related column (INNER, LEFT, RIGHT, FULL JOIN)
- GROUP BY / HAVING: Groups rows and filters groups
- Aggregate functions: COUNT(), SUM(), AVG(), MIN(), MAX()
Other Database Types
- NoSQL databases: Non-relational; designed for scale and flexibility — document (MongoDB), key-value (Redis), column-family (Cassandra), graph (Neo4j)
- Object-oriented database: Stores data as objects (aligned with OOP languages)
- Data warehouse: Subject-oriented, integrated, time-variant, non-volatile — optimized for analytics, not transactions
- Data mart: A subset of a data warehouse focused on a specific business unit
- Hadoop / HDFS: Distributed file system for processing very large datasets (big data)
Programming, Security & Ethics
~12%Programming Fundamentals
A program is a set of instructions that tells a computer what to do. Programming involves problem-solving: understand the problem → design an algorithm → code it → test/debug.
Algorithms and Flowcharts
- Algorithm: A finite, step-by-step procedure to solve a problem; must be unambiguous, finite, and effective
- Pseudocode: Informal, English-like description of an algorithm
- Flowchart symbols: Oval (start/end), rectangle (process), diamond (decision/branch), parallelogram (input/output), arrow (flow)
Control Structures
- Sequence: Instructions executed one after another in order
- Selection (decision): IF-THEN-ELSE branches based on condition
- Repetition (loop): WHILE, FOR, DO-WHILE — repeats a block until a condition is met
Programming Paradigms
- Procedural/Structured: Programs as sequences of procedures/functions (C, Pascal)
- Object-Oriented (OOP): Programs as interacting objects with data and behavior; four pillars: encapsulation, inheritance, polymorphism, abstraction (Java, Python, C++)
- Functional: Programs as mathematical functions; avoids state and mutable data (Haskell, Lisp)
- Scripting: Interpreted languages for automation (Python, JavaScript, Bash)
Languages by Level
- Machine language: Binary (0s and 1s); directly executed by CPU
- Assembly language: Symbolic mnemonics; translated by assembler
- High-level languages: English-like syntax; compiled or interpreted (Python, Java, C++, C#)
Cybersecurity
Major Threats
- Malware: Malicious software — virus (attaches to files), worm (self-replicates), Trojan horse (disguises as legitimate), ransomware (encrypts files for ransom), spyware
- Phishing: Fraudulent emails/sites that trick users into revealing credentials
- Social engineering: Manipulating people rather than systems to gain access
- DoS/DDoS: Denial-of-Service — overwhelming a system with traffic to make it unavailable
- Man-in-the-middle: Attacker intercepts communication between two parties
- SQL injection: Inserting malicious SQL code into input fields to manipulate a database
Security Measures
- Encryption: Encoding data so only authorized parties can read it — symmetric (same key) vs. asymmetric (public/private key pair)
- Firewall: Hardware or software that filters network traffic by rules
- Authentication: Verifying identity — passwords, biometrics, MFA (multi-factor authentication)
- SSL/TLS: Secures web communication — HTTPS uses TLS to encrypt data in transit
- VPN (Virtual Private Network): Encrypts traffic over public networks; creates secure tunnel
- Antivirus/anti-malware: Detects and removes malicious software
- Backup and recovery: Regular backups protect against data loss; 3-2-1 rule (3 copies, 2 media types, 1 offsite)
Privacy, Ethics, and Legal Issues
Privacy
- Data privacy: Right of individuals to control personal information
- HIPAA: Health Insurance Portability and Accountability Act — protects health information
- FERPA: Family Educational Rights and Privacy Act — protects student education records
- GDPR: EU General Data Protection Regulation — broad consumer data rights in Europe
- Cookies and tracking: Websites collect user behavior data; third-party cookies enable cross-site tracking
Intellectual Property
- Copyright: Protects original works (software, text, music) automatically upon creation
- Patent: Protects inventions for 20 years; must be novel, non-obvious, useful
- Trademark: Protects brand names and logos
- Trade secret: Confidential business information (algorithms, formulas)
- Software piracy: Unauthorized copying or use of licensed software
Ethical Issues
- Digital divide: Gap between those with and without access to technology
- Algorithmic bias: AI/ML systems that perpetuate or amplify discrimination
- Net neutrality: ISPs must treat all internet traffic equally
- Acceptable use policies (AUP): Rules governing employee use of company technology
- Computer fraud and abuse: Unauthorized access to systems is illegal (Computer Fraud and Abuse Act)
Key Figures
| Figure | Era | Significance |
|---|---|---|
| Charles Babbage | 1820s–1870s | Designed the Analytical Engine — the first concept of a general-purpose programmable computer |
| Ada Lovelace | 1840s | Wrote what is considered the first algorithm intended for a machine; first computer programmer |
| Alan Turing | 1930s–50s | Theoretical foundations of computing (Turing machine); WWII codebreaker; Turing Test for AI |
| John von Neumann | 1940s–50s | Von Neumann architecture — the stored-program computer model used in virtually all modern computers |
| Claude Shannon | 1940s–60s | Father of information theory; mathematical framework for digital communication (bits, entropy) |
| Grace Hopper | 1950s–70s | Developed first compiler; led development of COBOL; coined the term "debugging" |
| Gordon Moore | 1965 | Moore's Law — transistor count doubles ~every two years; drove semiconductor industry roadmap |
| Edgar F. Codd | 1970s | Proposed the relational database model (1970); laid the foundation for all modern relational databases |
| Dennis Ritchie | 1970s | Created the C programming language and co-created Unix OS — foundation of modern computing |
| Vinton Cerf & Bob Kahn | 1970s–80s | Designed TCP/IP protocols — the foundational communication protocols of the internet |
| Bill Gates | 1970s–2000s | Co-founded Microsoft; MS-DOS and Windows OS brought personal computing to the masses |
| Steve Jobs | 1970s–2010s | Co-founded Apple; pioneered the GUI-based personal computer, smartphone (iPhone), and tablet (iPad) |
| Linus Torvalds | 1991–present | Created the Linux kernel; powers servers, Android, supercomputers worldwide |
| Tim Berners-Lee | 1989–present | Invented the World Wide Web (HTML, HTTP, URL); advocates for open, accessible web |
| Marc Andreessen | 1990s–present | Co-created Netscape browser; popularized the web; coined "software is eating the world" |
| Larry Page & Sergey Brin | 1990s–present | Founded Google; PageRank algorithm revolutionized web search and online advertising |
| Jeff Bezos | 1990s–present | Founded Amazon; AWS pioneered cloud computing IaaS; transformed e-commerce |
| Michael Porter | 1980s–present | Value chain analysis; competitive advantage through IT; strategic frameworks for IS decisions |
| Geoffrey Moore | 1990s | Crossing the Chasm — technology adoption chasm between early adopters and mainstream market |
| Nicholas Carr | 2000s | "IT Doesn't Matter" (2003) — argued IT has become a commodity like electricity; sparked debate on IT's strategic value |
| Shoshana Zuboff | 2000s–present | Coined "surveillance capitalism" — analysis of how tech companies monetize personal data |
| Don Tapscott | 1990s–present | The Digital Economy; blockchain and digital transformation thought leadership |
Key Terms
Video Resources
Practice Questions (200)
A) Control Unit
B) Cache
C) Arithmetic Logic Unit (ALU)
D) Register
A) Permanent and faster than ROM
B) Volatile and used for active program storage
C) Non-volatile and stores firmware
D) Read-only and cannot be changed
A) Hard disk drive (HDD)
B) Solid-state drive (SSD)
C) CPU registers
D) RAM
A) 4
B) 8
C) 16
D) 32
A) Doubles every 18 months to 2 years, leading to exponential performance gains
B) Halves every five years as manufacturing improves
C) Increases linearly with R&D investment
D) Is limited by the speed of light
A) Utility software
B) Application software
C) Operating system
D) Middleware
A) Proprietary software
B) Freeware
C) Shareware
D) Open-source software
A) Completes all requirements gathering before any coding begins
B) Uses iterative, incremental sprints and adapts to changing requirements
C) Requires more extensive documentation at each phase
D) Is only suitable for small projects with fewer than five developers
A) WAN (Wide Area Network)
B) MAN (Metropolitan Area Network)
C) LAN (Local Area Network)
D) PAN (Personal Area Network)
A) Each other in a complete mesh
B) A single backbone cable
C) A central hub or switch
D) The device in front of them in a ring
A) Encrypts web traffic between browser and server
B) Assigns IP addresses to devices automatically
C) Translates domain names into IP addresses
D) Routes data packets between networks
A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) DaaS (Desktop as a Service)
A) Creating the TCP/IP protocol suite
B) Inventing the World Wide Web (HTML, HTTP, URL)
C) Developing the first relational database
D) Co-founding Microsoft and developing Windows
A) DSS (Decision Support System)
B) EIS (Executive Information System)
C) MIS (Management Information System)
D) TPS (Transaction Processing System)
A) A system that analyzes customer buying behavior for personalized marketing
B) An integrated suite that connects all major business processes through a shared database
C) A specialized accounting system for financial reporting
D) A project management tool for tracking software development
A) The physical design specifications and database schema
B) Working code for the application
C) A requirements specification documenting user needs
D) A feasibility study determining if the project should proceed
A) Routine, highly structured operational decisions
B) Semi-structured decisions requiring analysis and modeling
C) Long-term strategic decisions made by top executives
D) Automated decisions requiring no human involvement
A) Developing the C programming language
B) Creating the TCP/IP protocol suite
C) Proposing the relational model for databases (1970)
D) Designing the first graphical user interface
A) A column that stores the most important data in the table
B) A column that uniquely identifies each row and cannot be null
C) The first column listed in the table definition
D) A column that connects to another table's data
A) Deletes employees earning more than $50,000
B) Returns all columns for employees earning over $50,000 sorted alphabetically
C) Returns name and salary for employees earning over $50,000, highest salary first
D) Updates salaries to $50,000 for all employees
A) Increase query performance by combining all data into one large table
B) Reduce data redundancy and improve data integrity across tables
C) Encrypt sensitive data stored in the database
D) Allow multiple users to access the database simultaneously
A) Stores only the most recent 30 days of data
B) Is optimized for real-time transaction processing
C) Integrates historical data from multiple sources for analytical queries
D) Only stores financial data from the accounting department
A) A process step (calculation or operation)
B) Input or output
C) The start or end of the program
D) A decision point (yes/no branch)
A) The ability of one class to inherit the properties of another
B) Bundling data and the methods that operate on that data together within an object
C) One method performing different behaviors depending on the object type
D) Hiding all implementation details from other programs
A) Software that detects and removes viruses from infected files
B) Hardware or software that monitors and filters network traffic based on security rules
C) An encryption system that protects data in transit
D) A VPN that hides a user's location from websites
A) Flooding a server with so much traffic it becomes unavailable
B) Inserting malicious code into database queries through input fields
C) Tricking users into revealing credentials through fraudulent emails or websites
D) Spreading malicious software by attaching it to legitimate program files
A) Uses two mathematically related keys — one public, one private
B) Uses the same key for both encryption and decryption
C) Can only encrypt text, not binary files
D) Is slower and used only for small amounts of data
A) Transfers files faster using compression
B) Can only be used on government websites
C) Encrypts the data exchanged between browser and server using TLS
D) Requires no server-side software configuration
A) FERPA
B) GDPR
C) HIPAA
D) CAN-SPAM
A) Each student has exactly one student ID number
B) One customer can place many orders, but each order belongs to one customer
C) Many students can enroll in many courses
D) Two entities share the same primary key
A) Amplify the signal so data can travel longer distances
B) Direct data packets between different networks using IP addresses
C) Broadcast incoming data to all devices on a LAN
D) Convert digital signals to analog for transmission over telephone lines
A) Value, Velocity, Variance
B) Volume, Variety, Velocity
C) Volume, Validation, Variety
D) Visibility, Velocity, Volume
A) Before any code is written, to validate requirements
B) After the system is designed but before coding begins
C) After development is complete, with actual end users testing the system
D) During production to monitor system performance
A) Direct cutover
B) Phased conversion
C) Pilot conversion
D) Parallel conversion
A) The physical layout of network hardware
B) The entity-relationship structure of the database
C) How data moves through a system — processes, data stores, entities, and data flows
D) The sequence of steps in a program algorithm
A) IF-THEN-ELSE (selection)
B) SEQUENCE
C) FOR loop (repetition)
D) CASE statement
A) Malware that self-replicates across networks without user action
B) Software that encrypts all files and demands ransom for the key
C) Malicious code that attaches itself to legitimate programs and spreads when those programs are executed
D) Software that secretly monitors and transmits user activity
A) The underlying algorithm or idea behind the software
B) The specific expression of the software code from the moment of creation
C) The software's functionality for 20 years
D) The brand name and logo of the software product
A) Inventing the mouse and GUI interface
B) Creating the first compiler and contributing to COBOL development
C) Designing the TCP/IP networking protocol
D) Developing the Java programming language
A) The gap between analog and digital signal quality
B) The division of the internet into public and private networks
C) The inequality between those with access to technology and those without
D) The security boundary between an organization's internal network and the internet
A) Microsoft SQL Server
B) Oracle Database
C) MySQL
D) MongoDB
A) Process high volumes of short transactions in real time (like recording sales)
B) Perform multidimensional analysis of business data — drill down, roll up, slice and dice
C) Replicate data from a production database to a backup server
D) Automate responses to network intrusion attempts
A) It uses vacuum tubes instead of transistors
B) Programs are stored in memory alongside data and can be modified at runtime
C) It processes instructions in parallel rather than sequentially
D) It requires punch cards for input and output
A) WHERE
B) GROUP BY
C) JOIN
D) HAVING
A) Faster internet access by caching frequently visited websites
B) Protection against malware by scanning incoming network traffic
C) An encrypted tunnel over a public network for secure remote access
D) A backup power source for network equipment
A) Government surveillance programs that monitor citizen internet usage
B) A business model that commodifies personal behavioral data to predict and influence behavior for profit
C) The use of CCTV cameras in retail stores to prevent shoplifting
D) International treaties governing corporate data collection practices
A) Direct cutover
B) Parallel conversion
C) Pilot conversion
D) Phased conversion
A) Patients' medical records from unauthorized disclosure
B) Consumer financial information held by banks
C) Students' education records and grants parents/students access rights
D) Children's online privacy from commercial websites
A) RAID (Redundant Array of Independent Disks)
B) The 3-2-1 backup rule
C) Full system imaging
D) Hot standby replication
A) Designing the first transistor and integrated circuit
B) The Turing machine — a theoretical model of computation — and the Turing Test for AI
C) Developing the C programming language and Unix operating system
D) Creating the TCP/IP protocol that underlies the internet
A) Application layer
B) Transport layer
C) Internet layer
D) Network Access layer
A) HTTPS is faster than HTTP because it compresses data
B) HTTPS encrypts data in transit using TLS/SSL, providing confidentiality and authentication
C) HTTP can only be used on local networks; HTTPS is required for the internet
D) HTTPS uses a different port (port 80) than HTTP (port 443)
A) Assign IP addresses dynamically to devices on a network
B) Translate human-readable domain names (e.g., example.com) into IP addresses
C) Route packets between different autonomous systems on the internet
D) Encrypt web traffic between clients and servers
A) IPv4's lack of support for wireless networks
B) IPv4's limited address space (approximately 4.3 billion addresses)
C) IPv4's inability to support encrypted communications
D) IPv4's maximum data transfer speed of 100 Mbps
A) Each other directly in a closed loop
B) A central hub or switch
C) A single shared backbone cable
D) Multiple redundant paths forming a mesh
A) Operates only within a single LAN segment
B) Connects different networks and routes packets between them using IP addresses
C) Amplifies signals to extend network range without analyzing traffic
D) Converts digital signals to analog signals for transmission over phone lines
A) Providing virtualized computing infrastructure (servers, storage, networking) on demand
B) Providing a platform for developers to build and deploy applications without managing underlying infrastructure
C) Providing fully functional software applications delivered over the internet, managed by the provider
D) Providing physical servers rented in a data center with guaranteed uptime
A) Connecting multiple physical computers in a peer-to-peer network
B) Creating simulated (virtual) versions of hardware, operating systems, or storage resources on a single physical machine
C) Storing all organizational data in a single centralized database
D) Using fiber-optic cables to increase network bandwidth
A) Volume
B) Velocity
C) Visibility
D) Variety
A) Real-time transaction processing (OLTP)
B) Analytical queries and historical reporting across large integrated datasets (OLAP)
C) Storing unstructured data such as images and video files
D) Providing instant updates to inventory and financial records
A) The first column in any database table
B) A unique identifier for each row in a table that cannot be null
C) A field that references a row in another table to create a relationship
D) An automatically generated sequence number assigned by the database
A) WHERE
B) ORDER BY
C) HAVING
D) GROUP BY
A) All repeating groups be eliminated from the table
B) All non-key attributes depend on the whole primary key (not just part of it)
C) All non-key attributes depend only on the primary key, not on other non-key attributes (no transitive dependencies)
D) Each table contain no more than one candidate key
A) Key-value store
B) Document database
C) Column-family database
D) Graph database
A) The source code for the new system
B) A detailed specification of what the system must do (functional and non-functional requirements)
C) A test plan documenting how the finished system will be verified
D) A deployment schedule for rolling the system out to users
A) Produces more detailed documentation at every stage
B) Requires all requirements to be fully defined before coding begins
C) Delivers working software in short iterations (sprints) with continuous feedback and adaptation
D) Is only suitable for small projects with fewer than five developers
A) Hardware, software, and network resources
B) Scope, time, and cost — changing one affects the others
C) Planning, execution, and monitoring phases
D) User requirements, technical design, and system testing
A) Replace all employees in an organization with automated software agents
B) Integrate core business processes (finance, HR, manufacturing, supply chain) into a single unified system
C) Provide internet security by monitoring all network traffic for intrusions
D) Store and manage only financial accounting data for regulatory compliance
A) Manage the flow of goods from supplier to customer
B) Track, manage, and improve all interactions with customers throughout the customer lifecycle
C) Automate payroll and benefits administration for employees
D) Monitor server performance and network uptime
A) Processes routine, structured business transactions in real time
B) Helps managers analyze data and model scenarios to support semi-structured decisions
C) Automates strategic planning by predicting future market trends with certainty
D) Replaces human judgment entirely in complex decision-making situations
A) Programming a computer with explicit rules for every possible situation
B) Systems that improve their performance on tasks through experience/data without being explicitly programmed for each task
C) Using robots to perform physical labor previously done by humans
D) Natural language interfaces that allow computers to understand spoken commands
A) The global network of websites and web services accessible via browsers
B) The interconnection of physical devices embedded with sensors, software, and connectivity to exchange data
C) A peer-to-peer network that enables file sharing between computers
D) Social media platforms that connect people around the world
A) A centralized database managed by a single trusted authority
B) A distributed, immutable ledger of transactions shared across a network where records are cryptographically linked
C) An encryption protocol used to secure HTTPS web connections
D) A type of cloud storage where multiple providers share server space
A) A type of malware that encrypts files and demands payment for the decryption key
B) Injecting malicious SQL commands into a database query through an input field
C) Deceptive communications (usually email) impersonating legitimate entities to trick users into revealing credentials or clicking malicious links
D) Flooding a server with requests to make it unavailable to legitimate users
A) Uses two mathematically related keys — a public key and a private key
B) Uses the same key for both encryption and decryption, making key distribution a challenge
C) Is always slower than asymmetric encryption for large data volumes
D) Cannot be used for secure internet communications
A) Confidentiality — prevents unauthorized parties from reading the message
B) Non-repudiation and integrity — proves the message came from a specific sender and has not been altered
C) Availability — ensures the service is accessible to authorized users at all times
D) Authorization — grants users permission to access specific resources
A) Encrypt all data passing through the network
B) Monitor and control incoming and outgoing network traffic based on predefined security rules
C) Detect and remove malware from infected computers on the network
D) Authenticate users before they are allowed to log into the system
A) BCP addresses short-term data backup; DR addresses long-term strategic planning
B) BCP focuses on maintaining critical business operations during a disruption; DR focuses on restoring IT systems and data after a disaster
C) BCP is required only for financial firms; DR is required for all businesses
D) BCP and DR are synonymous terms used interchangeably
A) Only companies headquartered in the European Union
B) Any organization that processes personal data of EU residents, regardless of where the organization is located
C) Only government agencies handling citizen data in Europe
D) Companies with more than 500 employees operating in Europe
A) Individual consumers buying products directly from businesses
B) Consumers selling goods to other consumers through an online marketplace
C) Businesses conducting commercial transactions with other businesses electronically
D) Businesses selling goods and services to government entities
A) Online retailers should focus exclusively on the top 20% of products that generate 80% of revenue
B) Internet retailers can profitably sell a much larger variety of niche products because the cumulative sales of low-volume items can equal or exceed sales of best-sellers
C) E-commerce will eventually replace all brick-and-mortar retail within 10 years
D) Companies with longer supply chains achieve greater profitability through economies of scale
A) The percentage of visitors who make a purchase during a session
B) The percentage of single-page sessions where visitors leave without interacting further
C) The average number of pages viewed per website visit
D) The speed at which web pages load for visitors
A) Testing two different products to see which has higher customer satisfaction
B) Comparing two versions of a web page or marketing element by splitting traffic to determine which performs better
C) Testing a website's security by attempting to exploit vulnerabilities
D) Comparing advertising spend between two competing companies
A) Use case diagram
B) Class diagram
C) Sequence diagram
D) Activity diagram
A) Making small, incremental improvements to existing processes over time
B) Fundamentally rethinking and radically redesigning business processes to achieve dramatic improvements in performance
C) Automating existing manual processes without changing their underlying structure
D) Outsourcing non-core business processes to third-party vendors
A) Manage inventory levels and track product shipments
B) Capture, store, organize, and share organizational knowledge and expertise to improve decision-making and performance
C) Monitor employee productivity and track time spent on each task
D) Process payroll and manage employee benefits automatically
A) Defining programming standards for software developers
B) Providing a set of best practices for IT service management to align IT services with business needs
C) Establishing network security protocols for enterprise environments
D) Certifying cloud service providers for regulatory compliance
A) Guessing user passwords through repeated automated login attempts
B) Intercepting network traffic between a client and server to steal data
C) Inserting malicious SQL code into input fields to manipulate or access a database
D) Overloading a server's memory with excessive requests until it crashes
A) Unpatched software vulnerabilities in operating systems and applications
B) Human psychology — manipulating people into revealing information or taking actions that compromise security
C) Weaknesses in encryption algorithms used to secure network communications
D) Physical access to computer hardware to install malicious devices
A) Maximize profits for their employer above all other considerations
B) Avoid public disclosure of security vulnerabilities under any circumstances
C) Contribute to society and human well-being, avoid harm, and be honest and trustworthy
D) Follow only the laws of the country in which their employer is headquartered
A) Manage employee scheduling and track vacation time requests
B) Coordinate the flow of materials, information, and finances from raw material suppliers through to the end customer
C) Create and distribute marketing materials to potential customers
D) Manage intellectual property licenses and patent filings
A) Optimizing factory machinery through sensor data analysis
B) Understanding, interpreting, and generating human language — powering chatbots, sentiment analysis, and voice assistants
C) Processing financial transactions and detecting fraudulent charges
D) Routing network packets to their optimal destination
A) Multiple public cloud providers (e.g., AWS + Microsoft Azure) with no private infrastructure
B) Private cloud or on-premises infrastructure with public cloud services, with data portability between them
C) Cloud computing with traditional mainframe systems in a legacy integration
D) A community cloud shared by several organizations with a shared mission
A) Group similar data points together without predefined categories
B) Predict which category a new data point belongs to based on training data with known labels
C) Discover associations between items frequently purchased together
D) Reduce the number of variables in a dataset while retaining most information
A) Managing agile software development projects
B) Providing IT governance and management best practices, linking IT to business goals
C) Establishing network security configurations for enterprise systems
D) Certifying database administrators and IT professionals
A) Free internet access and data storage services
B) Know what personal data businesses collect about them, opt out of its sale, and request its deletion
C) Sue technology companies for any data breach regardless of damages
D) Require businesses to encrypt all communications with California residents
A) Replacing desktop computers for office productivity tasks
B) Employee health monitoring, workplace safety, hands-free operations, and enhanced field service
C) Storing large volumes of enterprise data at reduced cost
D) Managing customer databases and processing sales transactions
A) Moving from detailed data to a higher-level summary
B) Navigating from summary-level data to more detailed underlying data
C) Rotating the data cube to view data from a different dimension
D) Filtering data to show only one specific category or value
A) To uniquely identify each row within its own table
B) To enforce referential integrity by linking a column in one table to the primary key of another table
C) To index a column for faster search performance
D) To store encrypted values that cannot be read without a decryption key
A) Secretly records keystrokes to capture passwords and sensitive data
B) Spreads by sending copies of itself to contacts in the victim's email address book
C) Encrypts the victim's files or locks them out of their system, demanding payment for restoration
D) Uses the victim's computer processing power to mine cryptocurrency without their knowledge
A) Technical, economic, legal, operational, and schedule feasibility
B) Only budget and timeline feasibility before any technical work begins
C) User satisfaction surveys collected after system implementation
D) Source code review to verify the system meets design specifications
A) Replaces all user involvement with automated requirements-extraction tools
B) Brings together users, managers, and developers in structured group workshops to define requirements collaboratively and accelerate consensus
C) Allows developers to independently define requirements without user input to save time
D) Is only used in agile projects and cannot be applied to waterfall SDLC
A) Requirements are completely clear and stable before development begins
B) Users have difficulty articulating requirements precisely, and iterative refinement through a working model helps clarify needs
C) The project must be delivered using a strict waterfall sequence with no iteration
D) The system involves only back-end batch processing with no user interface
A) It has no transitive dependencies between non-key attributes
B) All non-key attributes are fully functionally dependent on the entire composite primary key
C) Each column contains atomic (indivisible) values, there are no repeating groups, and each row is uniquely identified
D) The table has been split into at least two related tables with a foreign key relationship
A) Column B is always greater in value than column A
B) Each value of A uniquely determines the value of B — knowing A tells you exactly what B is
C) Columns A and B must always be in the same table
D) B is the primary key and A is the foreign key referencing it
A) Physical transmission of bits over cables and wireless signals
B) Logical addressing (IP addresses) and routing packets across networks
C) End-to-end communication, segmentation, flow control, and error recovery between applications
D) Establishing, managing, and terminating communication sessions between applications
A) An unauthorized user reads confidential salary records
B) A ransomware attack makes all company files inaccessible
C) An attacker intercepts and modifies a financial transaction record during transmission
D) An employee shares their password with a co-worker
A) Encrypt all data stored on company servers
B) Authenticate the identity of a public key's owner, binding a public key to a verified entity via a trusted Certificate Authority
C) Generate new encryption keys automatically every 24 hours
D) Replace passwords with biometric authentication for all users
A) An attacker remotely installing malware on a target's computer through a software vulnerability
B) An attacker secretly intercepting and potentially altering communications between two parties who believe they are communicating directly with each other
C) An attacker overwhelming a server with traffic from a single source
D) An attacker using stolen credentials to log into a system as a legitimate user
A) A method of encrypting data before transmission to a cloud storage provider
B) The process of pulling data from source systems, cleaning and converting it to a consistent format, and loading it into the data warehouse
C) A network protocol for transferring large files between servers
D) A software testing methodology for validating database queries
A) Complex multi-table analytical queries across years of historical data
B) Fast, concurrent, routine transactions — inserts, updates, and deletes — with ACID properties
C) Storing unstructured data such as images, video, and social media posts
D) Running machine learning algorithms on large datasets in batch mode
A) Which category a new data point belongs to based on labeled training examples
B) Natural groupings in unlabeled data based on similarity
C) Relationships between variables that frequently co-occur — "customers who buy X also tend to buy Y"
D) Unusual data points that deviate significantly from the norm
A) IaaS providers manage the operating system, middleware, and application software for the customer
B) Customers can scale computing resources up or down on demand and pay only for what they use, eliminating capital expenditure on hardware
C) IaaS is inherently more secure than on-premises infrastructure in all scenarios
D) IaaS eliminates the need for any IT staff, as the provider handles everything
A) Calculate the critical path and identify tasks with no scheduling flexibility
B) Display project tasks as horizontal bars along a timeline, showing duration, sequence, and progress
C) Estimate the probability that a project will be completed on time using Monte Carlo simulation
D) Allocate budget to individual project tasks based on estimated resource costs
A) A deliberate expansion of project scope approved through formal change control
B) The uncontrolled expansion of project requirements beyond the original agreement, without corresponding adjustments to time, budget, or resources
C) A technique for gradually reducing project scope to meet budget constraints
D) The natural shrinkage of deliverables as a project nears completion
A) The ERP software containing too many features for organizations to use effectively
B) Inadequate change management — failure to prepare users, overcome resistance, and align organizational processes with the new system
C) ERP systems being incompatible with modern database management systems
D) Government regulations preventing companies from sharing data across departments
A) Firewall protection that blocks unauthorized access to the merchant's web server
B) Encryption of data in transit and server authentication via digital certificates, protecting payment data from interception
C) Virus scanning of all files downloaded during the shopping session
D) Two-factor authentication requiring users to confirm purchases via SMS
A) Describe what happened in the past through summary reports and dashboards
B) Explain why a business outcome occurred by identifying root causes
C) Forecast future outcomes and identify likely trends using statistical models and machine learning
D) Prescribe the optimal action to take by simulating all possible decision outcomes
A) The sequence of project tasks with the most resources allocated
B) The longest sequence of dependent tasks that determines the minimum project duration — any delay on the critical path delays the entire project
C) The tasks most likely to exceed their budget estimates
D) The shortest possible sequence of tasks needed to complete the project
A) Learn from data through experience without being explicitly programmed with rules
B) Use a knowledge base of domain expertise and an inference engine to reason through problems and provide expert-level recommendations
C) Process natural language input from users and generate human-like conversational responses
D) Control physical robots in manufacturing environments using sensor feedback
A) A key that uses encryption to secure sensitive column values
B) A primary key consisting of two or more columns whose combined values uniquely identify each row
C) A foreign key that references multiple tables simultaneously
D) An index created on multiple columns to speed up multi-column search queries
A) All data in the database is encrypted with a valid encryption key
B) A foreign key value in one table must match an existing primary key value in the referenced table, or be null
C) All columns in a table must have unique values with no duplicates
D) Query results are returned within a maximum defined response time
A) All rows from the left table and matching rows from the right table, with NULLs for non-matches
B) All rows from both tables regardless of whether there is a matching value
C) Only the rows where there is a matching value in both tables based on the join condition
D) Only rows that exist in one table but not the other
A) Bandwidth measures the time a packet takes to travel from source to destination; latency measures data volume per second
B) Bandwidth is the maximum data throughput capacity of a network link (e.g., Mbps); latency is the time delay for a packet to travel from source to destination (e.g., milliseconds)
C) Bandwidth and latency are synonymous terms for network speed
D) High bandwidth always results in low latency because more data travels simultaneously
A) Detailed technical standards for configuring network equipment
B) Governance and management of enterprise IT — ensuring IT creates value, manages risks, and uses resources efficiently for business objectives
C) Agile software development practices for faster feature delivery
D) Certification of individual IT professionals in specific technical domains
A) Stores only real-time transactional data for operational use
B) Is a subset of the data warehouse focused on a specific business function, department, or subject area
C) Replaces the data warehouse by providing all organizational data in one specialized structure
D) Is an unstructured data store for documents and multimedia files
A) Unsupervised learning
B) Reinforcement learning
C) Supervised learning
D) Transfer learning
A) Sending email messages between mail servers across the internet
B) Translating domain names to IP addresses for web browsing
C) Transferring files between a client and a server on a network
D) Securing web traffic through encryption of HTTP connections
A) It requires the least cabling and is the simplest to install
B) It provides redundant paths between nodes so that the network continues to function even if multiple connections fail
C) All devices connect through a single central switch, making management simple
D) It is the only topology that supports wireless connections
A) The source code quality and coding standards of software applications
B) Whether IT controls are adequate, risks are managed, and IT investments deliver business value as intended
C) The performance benchmarks of individual servers and network equipment
D) User satisfaction scores from the IT help desk ticket system
A) LANs always use wireless technology while WANs always use physical cables
B) A LAN covers a small geographic area (building or campus) under one organization's control; a WAN spans large distances, often using leased telecommunications infrastructure
C) WANs are always faster than LANs due to their use of fiber-optic backbone connections
D) LANs can only connect up to 255 devices due to IPv4 addressing limitations
A) The maximum acceptable data loss measured as a point in time before the disaster
B) The maximum acceptable duration of downtime before the business suffers unacceptable harm — the target time to restore operations after a disruption
C) The total cost of restoring systems following a catastrophic failure
D) The percentage of time a system must be available per year (e.g., 99.99% uptime)
A) A longer symmetric key that is impossible to intercept
B) Asymmetric encryption to securely exchange the symmetric session key (the hybrid encryption approach used by TLS)
C) Sending the encryption key through a separate physical courier to the recipient
D) Storing the encryption key in the same encrypted file as the data
A) Involve businesses selling products manufactured in-house directly to end consumers
B) Enable individuals to sell goods or services directly to other individuals, with the platform acting as an intermediary marketplace
C) Involve government agencies selling surplus equipment to the public through online auctions
D) Refer exclusively to digital subscription services delivered via streaming
A) Requirements are expected to change frequently throughout the project
B) Rapid delivery of working software is more important than comprehensive documentation
C) Requirements are well understood and stable, the project has a fixed scope, and a disciplined sequential approach is appropriate
D) Small cross-functional teams need to deliver features in two-week sprint cycles
A) Demonstrate completed features to stakeholders and gather product feedback
B) Plan the tasks and user stories to be completed in the next sprint
C) Review how the team worked together during the sprint and identify process improvements for the next sprint
D) Assess the project's overall progress against the long-term product roadmap
A) Explicitly programmed decision trees with thousands of hand-coded rules
B) Multi-layered neural networks with many hidden layers that automatically learn hierarchical feature representations from raw data
C) Statistical regression models applied to structured tabular data
D) Symbolic logic and rule-based inference engines similar to expert systems
A) Retrieving email messages from a mail server to a client application
B) Sending email messages between mail servers and from email clients to mail servers
C) Securing email messages with end-to-end encryption
D) Synchronizing email folders across multiple devices
A) Providing end-to-end reliable data delivery and flow control between hosts
B) Data translation, encryption/decryption, and compression — ensuring data is in a usable format for the Application layer
C) Establishing, maintaining, and terminating communication sessions
D) Routing packets between different networks using logical addressing
A) It requires labeled training data with predefined categories to group new observations
B) The algorithm discovers natural groupings in data without predefined labels — the categories emerge from the data patterns themselves
C) It clusters data by sorting it in ascending order based on a key attribute
D) It uses a cluster of database servers to improve query performance
A) Packet-filtering firewall
B) Stateful inspection firewall
C) Web Application Firewall (WAF)
D) Network Address Translation (NAT) device
A) Data that has been permanently deleted and cannot be recovered
B) Data collected and stored by organizations but never analyzed or used for decision-making
C) Encrypted data that can only be accessed by authorized users with the decryption key
D) Data stored on servers that are physically located in unreachable geographic areas
A) Encrypting the cardholder's name and billing address but leaving the card number in plain text
B) Replacing sensitive payment data (such as a credit card number) with a non-sensitive substitute (token) that has no exploitable value if intercepted
C) Requiring customers to re-enter their card details for every transaction without storing any data
D) Using a separate physical card reader that encrypts data at the point of swipe
A) Writing executable source code in a visual programming language
B) Visually documenting and communicating business workflows, enabling analysis, improvement, and system design
C) Calculating the financial return on investment for proposed IT projects
D) Monitoring server performance and generating alerts for IT operations teams
A) The unequal distribution of internet bandwidth between developed and developing countries
B) Situations where one party in a transaction has significantly more or better information than the other, creating potential market inefficiencies or exploitation
C) The difference in processing speed between different types of computer processors
D) An imbalance in the number of buyers vs. sellers on an e-commerce platform
A) Physically connecting the remote worker's computer to the corporate network via a dedicated cable
B) Creating an encrypted tunnel between the remote device and the corporate network, protecting data from interception on untrusted networks
C) Preventing the remote worker's computer from accessing any non-corporate websites
D) Scanning all incoming files for malware before they reach the corporate network
A) Denormalization fixes normalization errors made during the initial database design
B) Highly normalized tables require many JOIN operations that slow analytical queries — denormalized structures like star schemas improve read performance for OLAP
C) Data warehouses must store duplicate data to comply with data retention regulations
D) Denormalization eliminates the need for primary keys and indexes in reporting databases
A) Public blockchain (like Bitcoin's network)
B) Consortium or private blockchain, where access is restricted to vetted participants
C) A traditional centralized database with audit logging enabled
D) A distributed denial-of-service protection network
A) Confidentiality — by intercepting data transmissions
B) Integrity — by altering data during transmission
C) Availability — by overwhelming a system so legitimate users cannot access it
D) Authentication — by bypassing login credentials
A) Two different passwords from different password managers
B) Something you know (password/PIN), something you have (phone/token), and/or something you are (biometric)
C) A username and a password, which constitute two separate authentication factors
D) Two biometric scans from different body parts
A) An external entity that sends or receives data outside the system boundary
B) A transformation of input data flows into output data flows — a function the system performs
C) A data store where data rests at rest between processes
D) The direction of data movement between two external entities
A) Each student is enrolled in exactly one course, and each course has exactly one student
B) Each student can enroll in many courses, and each course can have many students enrolled
C) Each student is enrolled in at most one course, but each course can have many students
D) Each course is taught by many students, and each student teaches many courses
A) A subclass inherits all attributes and methods of its parent class
B) A class bundles its data (attributes) and the methods that operate on that data together, hiding internal implementation details from outside objects
C) An object can take multiple forms depending on the context in which it is used
D) A parent class defines a template that subclasses must implement differently
A) Automates routine transaction recording with speed and accuracy as the primary goal
B) Provides interactive tools — database, model base, and user interface — that help managers analyze complex problems and make semi-structured decisions
C) Generates scheduled operational reports for lower-level management
D) Automatically executes decisions without requiring human judgment
A) Real-time stock market trading based on financial data feeds
B) Spatial analysis — mapping, location-based decision-making such as site selection, logistics routing, demographic targeting, and environmental analysis
C) Machine learning classification of customer purchase intent from clickstream data
D) Scheduling employee shifts based on forecasted customer demand
A) Every available data field from every source system to give managers the most complete picture possible
B) Key performance indicators (KPIs) most critical to the organization's strategic objectives, presented visually with drill-down capability for investigation
C) Only historical data from the past 10 years with no real-time updates
D) Raw transaction records that managers can sort and filter themselves
A) The blockchain database is owned and controlled by a central administrator who validates all transactions
B) Copies of the complete transaction ledger are distributed across many nodes; no single node has exclusive control, and changes require consensus among network participants
C) Financial transactions are distributed across multiple bank accounts to reduce fraud risk
D) Data is distributed geographically across multiple data centers managed by one company for redundancy
A) A secure network used exclusively by government agencies for inter-departmental communication
B) A network of physical objects embedded with sensors, software, and connectivity that collect and exchange data — enabling remote monitoring, automation, and data-driven decisions
C) The collection of all websites and web applications accessible via a standard web browser
D) A protocol that enables encrypted peer-to-peer file sharing between users
A) Velocity — the variety of different data formats (structured, semi-structured, unstructured)
B) Volume — the massive scale of data generated (terabytes, petabytes, exabytes)
C) Veracity — the speed at which data is generated and must be processed
D) Value — the structural diversity of data sources and formats
A) The model is too simple and misses important patterns in both training and new data
B) The model learns the training data too precisely — including noise — and performs well on training data but poorly on new, unseen data
C) The training dataset is too large for the algorithm to process in reasonable time
D) The model is trained on too many features relative to the number of training examples
A) Translates text from one human language to another while preserving idiomatic meaning
B) Automatically identifies and extracts the emotional tone (positive, negative, neutral) expressed in text — such as product reviews, social media posts, or customer feedback
C) Classifies documents into predefined topical categories for information retrieval
D) Generates grammatically correct summaries of long documents by extracting key sentences
A) Creative problem-solving and strategic planning where novel judgment is required
B) High-volume, repetitive, rule-based tasks with structured data inputs — such as copying data between systems, processing forms, and generating reports
C) Physical manufacturing tasks requiring robots with machine vision and dexterous manipulation
D) Customer service conversations requiring empathy and nuanced understanding of emotional context
A) Request that any website remove negative news articles about them from Google search results immediately and unconditionally
B) Request deletion of their personal data when it is no longer necessary for the purpose it was collected, when consent is withdrawn, or when the processing was unlawful — subject to exceptions for legal obligations and public interest
C) Permanently opt out of all digital marketing without any legal exceptions
D) Receive a complete copy of all data a company holds about them within 30 days
A) Prevent, Detect, Respond, Recover, Review
B) Identify, Protect, Detect, Respond, Recover
C) Assess, Implement, Monitor, Test, Improve
D) Plan, Do, Check, Act, Audit
A) Reducing all technology costs to zero through automation
B) Linking and integrating primary activities (inbound logistics, operations, outbound logistics, marketing, service) and support activities (procurement, HR, technology development, firm infrastructure) to reduce costs or differentiate the product
C) Replacing all human workers in primary value chain activities
D) Ensuring compliance with government regulations at each stage of production
A) The sequence of messages exchanged between objects over time to complete a use case
B) Classes (with their attributes and methods), relationships between classes (association, inheritance, aggregation, composition), and multiplicity
C) The states an object can be in and the events that trigger transitions between states
D) The deployment of software components on physical hardware nodes
A) Cryptocurrency is a type of blockchain; blockchain is only used for cryptocurrency applications
B) Blockchain is the underlying distributed ledger technology; cryptocurrency (like Bitcoin) is one application of blockchain — but blockchain has many non-cryptocurrency applications such as supply chain tracking, smart contracts, and identity management
C) They are synonymous terms describing the same technology
D) Cryptocurrency requires blockchain; blockchain cannot function without cryptocurrency as a transaction incentive
A) The dataset is balanced with equal numbers of positive and negative examples
B) The cost of false positives and false negatives differs significantly — for example, in medical diagnosis or fraud detection where different error types have different consequences
C) The model needs to be retrained every time new data arrives
D) The model is used for regression rather than classification tasks
A) Collect the maximum amount of patient health information to ensure complete care
B) Use, disclose, or request only the minimum amount of protected health information (PHI) necessary to accomplish the intended purpose
C) Encrypt all health data using a minimum key length of 256 bits
D) Retain patient records for a minimum of 10 years after the date of service
A) Inadequate programming languages and development tools
B) Lack of user input during requirements gathering, unclear requirements, and poor change management — leading to systems that do not meet actual business needs
C) Hardware failures and infrastructure deficiencies during deployment
D) Excessive project budgets that lead to gold-plating and feature overload
A) Data is owned exclusively by the corporation that generates it, regardless of user agreements
B) Digital data is subject to the laws and governance structures of the nation in which it is collected or stored, creating legal complexity for multinational IS deployments
C) Governments have the sovereign right to access all corporate data stored within their borders without any legal process
D) Data must remain physically located within the data center of the organization that owns it
A) The internal processing logic and data flows within a system module
B) The interactions between actors (users or external systems) and the system — what functions the system provides to each actor, from the user's perspective
C) The sequence of database queries executed when a user logs in to the system
D) The organizational hierarchy of users who have permission to access the system
A) A class to inherit attributes and methods from more than one parent class simultaneously
B) Objects of different classes to respond to the same method call in class-specific ways — enabling code that works with objects of different types without knowing their specific class
C) A single variable to hold different primitive data types at different points in a program
D) Multiple programmers to work on the same class simultaneously using version control
A) A legally binding paper contract that has been digitized and stored as a PDF on the blockchain
B) Self-executing code stored on the blockchain that automatically enforces the terms of an agreement when predefined conditions are met — without requiring trusted intermediaries
C) An AI system that reviews contracts for compliance with relevant laws before parties sign
D) A contract between a smart device manufacturer and the consumer governing IoT data collection
A) Financial statement audits of publicly traded companies required under Sarbanes-Oxley
B) Cloud service providers and SaaS vendors — auditing their controls related to security, availability, processing integrity, confidentiality, and privacy of customer data
C) Physical security audits of data center facilities for compliance with NIST standards
D) Government contractors' compliance with Federal Information Security Management Act (FISMA)
A) Create a completely independent copy of the parent class with no shared code or attributes
B) Automatically receive all attributes and methods of its parent class, then extend or override them as needed — promoting code reuse and hierarchical organization
C) Transfer data between two unrelated classes without defining a formal relationship
D) Merge two existing classes into a single new class that combines both sets of attributes
A) It replaces human decision-makers entirely with automated AI algorithms
B) It provides electronic meeting tools — simultaneous anonymous input, voting, idea generation, and structured discussion — to support collaborative group decisions while reducing groupthink and social pressure
C) It processes transaction data in real time for groups of operational users
D) It enables multiple users to access the same database simultaneously for routine queries
A) The technical incompatibility between different operating systems and software platforms
B) The gap between those who have access to digital technologies (computers, broadband, digital literacy) and those who do not — creating social and economic inequality
C) The difference in processing speed between consumer and enterprise-grade hardware
D) The division between analog legacy systems and modern digital infrastructure within an organization
A) The OSI model, which defines IS architecture in terms of network communication layers
B) The Balanced Scorecard's "Learning and Growth" perspective, which includes IS capabilities as enablers of achieving financial, customer, and internal process objectives
C) The TCP/IP protocol stack, which ensures IS data transmission is reliable
D) The SDLC waterfall model, which sequences IS development activities
A) Lower upfront hardware costs because edge devices are less expensive than cloud servers
B) Reduced latency, lower bandwidth consumption, and the ability to function during network outages — enabling real-time local decisions
C) Enhanced data security because the cloud provider cannot access sensitive IoT data
D) Simplified IT management because all processing is handled by a single edge gateway
A) The training set is used to tune hyperparameters; the test set is used to train the final model
B) The training set is used to fit the model; the test set is held out to evaluate how well the model generalizes to new, unseen data — preventing overfitting
C) Training and test sets are both used simultaneously during model training to improve convergence speed
D) The test set is used to remove outliers from the training data before the model is fit
A) Only the right to delete data — no rights to know what data is collected or to opt out of sale
B) The right to know what personal information is collected, the right to delete personal information, the right to opt out of the sale of personal information, and the right to non-discrimination for exercising these rights
C) The right to financial compensation for every use of their personal data by any business
D) The right to approve or deny data collection before any personal information is gathered
A) Uses labeled training data to learn the relationship between inputs and known outputs
B) Finds patterns, groupings, or structure in data without predefined labels — the algorithm discovers relationships the analyst may not have hypothesized in advance
C) Requires human feedback after every prediction to improve accuracy
D) Is only used for image recognition and natural language processing tasks
A) The technical specifications for secure web communication protocols (HTTPS/TLS)
B) An Information Security Management System (ISMS) — a systematic approach to managing sensitive company information by assessing risks and implementing appropriate controls across people, processes, and technology
C) Physical data center construction standards including access control, fire suppression, and cooling
D) Software development quality assurance processes for certified application vendors
A) Gain unauthorized access to a system by exploiting software vulnerabilities before a patch is available
B) Deceive users into revealing credentials, clicking malicious links, or installing malware through fraudulent communications that appear to come from trusted sources
C) Intercept network traffic between two parties by positioning a device on the communication path
D) Overload a server with malicious traffic to deny service to legitimate users
A) Encrypts sensitive data in a referenced table for security purposes
B) Enforces referential integrity by ensuring that a value in one table's column matches an existing primary key value in the referenced table — preventing orphaned records
C) Creates a secondary index on frequently queried columns to improve performance
D) Assigns a unique identifier to each row in a table, ensuring no duplicates exist
A) The technical process of backing up databases to prevent data loss
B) The policies, roles, responsibilities, standards, and processes that ensure data assets are managed as a valuable organizational resource — covering data quality, ownership, access, privacy, and lifecycle
C) The use of encryption to protect data during transmission across networks
D) The IT department's authority to approve all software purchases that involve data storage
A) The natural reduction in project scope that occurs as requirements become better understood
B) The uncontrolled expansion of project requirements beyond the original agreed scope — typically without corresponding adjustments to schedule, budget, or resources
C) A project management methodology that gradually expands scope in planned increments
D) The technical debt accumulated when developers cut corners to meet deadlines
A) Translate legal contracts from technical jargon into plain English automatically
B) Automatically assign incoming documents, emails, or tickets to predefined categories — enabling routing, prioritization, and workflow automation without human reading each document
C) Generate synthetic training data for machine learning models by writing realistic fake documents
D) Extract named entities (people, organizations, locations) from unstructured text to populate databases
A) Attended RPA uses physical robotic arms; unattended RPA uses purely software bots
B) Attended RPA runs on a user's desktop and is triggered by the user during their workflow; unattended RPA runs autonomously on servers without human initiation, triggered by schedules or events
C) Attended RPA handles structured data; unattended RPA processes unstructured data like emails
D) Attended RPA requires IT approval for each task; unattended RPA runs without any oversight
A) A trusted central authority votes on which transactions are valid before they are added to the blockchain
B) Network participants follow agreed-upon rules (proof of work, proof of stake, etc.) to validate and agree on new blocks — making it computationally or economically costly to add fraudulent blocks
C) All blockchain participants must be manually verified by a government agency before they can vote on transactions
D) Consensus is achieved automatically because blockchain uses end-to-end encryption that prevents any fraudulent transactions from being submitted
A) Personal data must be stored in portable physical media that can be delivered to users on request
B) Individuals have the right to receive a copy of their personal data in a structured, commonly used, machine-readable format, and to transmit that data to another controller
C) All personal data must be encrypted during transmission between EU countries
D) Companies must transfer all EU resident data to EU-based servers within 30 days of collection
A) A single system to handle increasing user loads by adding more hardware resources
B) Different systems, applications, or organizations to exchange data and use the shared information effectively — regardless of differences in platform, vendor, or technology
C) A database to maintain consistency during concurrent transactions through locking mechanisms
D) IT staff to remotely access and manage systems from any geographic location
A) A security model that assumes all users inside the corporate network are trusted; only external connections require authentication
B) A security model that assumes no user, device, or network segment is inherently trusted — every access request must be continuously authenticated, authorized, and validated regardless of location
C) A security policy that grants users zero access by default; access is granted manually by the security team for each individual request
D) A network architecture that uses no passwords, replacing all authentication with biometric verification only
A) Data warehouses store only current operational data; data lakes store only historical archives
B) Data warehouses store structured, processed data in a predefined schema optimized for analytics (schema-on-write); data lakes store raw data in any format — structured, semi-structured, or unstructured — until it is queried (schema-on-read)
C) Data warehouses are cloud-based; data lakes are always stored on-premises
D) Data warehouses use NoSQL databases; data lakes use relational databases
A) Serve as the final production system after stakeholder sign-off, eliminating the need for full development
B) Provide stakeholders with a working model of the proposed system so they can experience the interface and functionality, identify gaps, and refine requirements before full development begins
C) Document all technical specifications in a visual format that programmers can code directly from
D) Test the system's performance under maximum expected user load before launch
A) Requires a direct line of sight between the reader and the tag, making it slower than barcode scanning
B) Can read multiple tags simultaneously without line-of-sight, over greater distances, and tags can store more data and be updated — enabling automated, real-time inventory and asset tracking
C) Is less expensive per unit than printed barcodes, making it the preferred choice for all consumer goods
D) Transmits data using visible light frequencies, allowing standard cameras to serve as readers
A) Physical data center security, network hardware maintenance, and hypervisor patching
B) Securing the operating system, applications, data, identity management, and network configurations within their cloud environment
C) All security responsibilities — the cloud provider manages nothing when IaaS is selected
D) No security responsibilities — IaaS providers are fully responsible for all security under the contract
A) Makes small, incremental changes to existing processes over time to gradually improve efficiency
B) Fundamentally redesigns business processes from scratch to achieve dramatic improvements in cost, quality, and speed — rather than improving the existing process incrementally
C) Uses Six Sigma statistical techniques to reduce process variation and defect rates
D) Focuses exclusively on automating manual tasks without changing the underlying process design
A) The absolute right to keep all personal information secret from all parties under all circumstances
B) A legitimate interest in controlling how information about themselves is collected, used, stored, and shared — and that organizations have corresponding ethical and legal obligations to respect these interests
C) The legal right to receive monetary compensation every time their data is used commercially
D) No privacy rights once they voluntarily share information with any digital platform