New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CITM-001 Questions and Answers

Question # 6

Processed or Meaningful data can be defined as ___________

A.

Metadata

B.

Information

C.

Raw Data

D.

Artifacts

Full Access
Question # 7

Which User-Oriented Design technique allows the systems analystto spend a great deal of time others?

A.

Brainstorming

B.

Interviews

C.

Presentations

D.

Seminars

Full Access
Question # 8

Important decision may require more care inanalyzing data.

A.

True

B.

False

Full Access
Question # 9

Which feature supports more than one processor?

A.

Multiprocessing

B.

Multithreading

C.

Multitasking

D.

Multiswitching

Full Access
Question # 10

Data are often proprietary or confidential.

A.

True

B.

False

Full Access
Question # 11

__________ level describes what datais stored in the database andthe relationships among the data

A.

Physical level

B.

Logical level

C.

Conceptual level

D.

Pictorial level

Full Access
Question # 12

Which strategy is helpful in seeking global efficiency whileretaining local responsiveness?

A.

Transitional Strategy

B.

Risk Strategy

C.

Multinational Strategy

D.

International Strategy

Full Access
Question # 13

Which application provides away to share documents betweenmultiple devices?

A.

Dropbox

B.

Whatsup

C.

Itunes

D.

Eventnote

Full Access
Question # 14

How many techniques are available to the design team forcollecting data?

A.

Three

B.

Four

C.

Five

D.

Six

Full Access
Question # 15

Which type of cost is considered as actual costs of analysis, design,and installation for the system?

A.

Service cost

B.

Maintenance cost

C.

Operating cost

D.

Development cost

Full Access
Question # 16

Middle managers canestablish review committees tofoster greater control.

A.

True

B.

False

Full Access
Question # 17

Which three are examples of Application Software? (Choose three)

A.

Adobe Photoshop

B.

Internet Explorer

C.

Linux

D.

Unix

E.

Microsoft Word

Full Access
Question # 18

Which three are the advantages ofDistributed Database? (Choosethree)

A.

Increase Availability

B.

Easier Expansion

C.

Easy to scale

D.

Improved Performance

Full Access
Question # 19

Coordination is a major problem for the global firm.

A.

True

B.

False

Full Access
Question # 20

A malicious program that records a user’s keystrokes is an exampleof:

A.

a Trojan horse.

B.

adware.

C.

an anti-virus program.

D.

a performance monitor.

Full Access
Question # 21

How many trends have drasticallyaltered the way organizationsuse technology?

A.

Six

B.

Seven

C.

Eight

D.

Five

Full Access
Question # 22

True or False: Step three (3) inundertaking of object-orientedanalysis defines the methods.

A.

True

B.

False

Full Access
Question # 23

Which management can make useof the managerial hierarchicalto obtain approvals or additional guidance?

A.

Higher Level Management

B.

Middle Level Management

C.

Lower Level Management

Full Access
Question # 24

Which two factors are importantwhile considering InterpretingInformation? (Choose two)

A.

Personal

B.

External

C.

Situational

D.

Financial

Full Access