تكنولوجيا المعلومات مستوى ثالث | جامعة صنعاء – Telegram
تكنولوجيا المعلومات مستوى ثالث | جامعة صنعاء
3.23K subscribers
1.12K photos
260 videos
2.35K files
737 links
💢القناة الرئيسية💢
https://news.1rj.ru/str/USF_Computer2_IT_10 ⬅️
💢مجتمع الدفعة IT3💢
https://news.1rj.ru/str/USF_IT_2024_COMMUNITY ⬅️
💢 قناة الأسئلة 💢
https://news.1rj.ru/str/hchgrcu ⬅️
بوت التواصل والمشاركة والإقتراحات
@Technologyhbot ⬅️
Download Telegram
نبيل الصهيبي_220724_105040.pdf
483.4 KB
🔴🔴
نموذج الاختبار النهائي لمادة إدارة تكنولوجيا المعلومات حق قبل سنتين ركزوا عليه قوي

في سؤالين حلهم غلط شوفوا التعديل في الصورتين اللي بعد النموذج 👇👇

#إدارة_تكنولوجيا_المعلومات
#نماذج_إدارة_تكنولوجيا_المعلومات
#نبيل_الصهيبي
#IT_Management
تكنولوجيا المعلومات مستوى ثالث | جامعة صنعاء
نبيل الصهيبي_220724_105040.pdf
🔴تعديل في الحل🔴
الإجابة الصحيحة هي الأولى
Directing business functions
تكنولوجيا المعلومات مستوى ثالث | جامعة صنعاء
نبيل الصهيبي_220724_105040.pdf
🔴تعديل في الحل🔴
الإجابة الصحيحة هي الثانية
The Data Warehousing System
💢بعض اسئلة الاختبار النهائي الذي اختبرناه💢

1. The first step in achieving business�IT alignment is _.

2. Which of the following guide the process of planning, acquiring, building, modifying, and interfacing with deployed IT resources in a single department within an organization?

Legacy systems
IT architectures
Data analytics
Technology stack

3. __ is a multi-disciplinary field that uses domain expertise, scientific methods, programming skills, algorithms and statistics to extract knowledge and insights from structured, semi-structured and unstructured big data sets to predict future behavior and prescribe actions.

Data mashup
Data mining
Data visualization
Data science

4. An intranet is a private, company-owned network that can be logged into remotely via the Internet. Typical users are suppliers, vendors, partners, or customers.

TRUE.
FALSE.

5. Which is a characteristic of Web 1.0?

Data: multiple sources, e.g., mashups
User-controlled content
Marketing goal: influence
Dynamic pages, XML, and Java
6. Which of the following guide the process of planning, acquiring, building, modifying, and interfacing with deployed IT resources in a single department within an organization?

Technology stack
IT architectures
Legacy systems
Data analytics
7. Which of the following data management technologies store data that are generated by business apps, sensors, and operations?

Data warehouses
Transaction-processing systems (TPS)
Data marts
Databases
8. Any unauthorized disclosure of personal information to third parties is normally considered a:

risk mitigation.
breach of privacy.
privacy paradox.
social engineering.
9. What kinds of reports are created only when something deviates from the norm?

Ad hoc reports
Management reports
Periodic reports
Exception reports
10. A person who may violate ethical standards or principles, but without malicious intent

Gray Hat Hacker
White Hat hacker
Red Hat hacker
Black Hat Hacker
11. Links between business and IT plans should be made at which of these level(s)?

Operational
Strategic
Tactical
All of the above.
12. ____ describe products, customers, events, activities, and transactions that are recorded, classified, and stored.

Data
Knowledge
Strategy
Information
13. Starting in 2000, Internet access became faster and more widely available due to large-scale adoption of

broadband technology
APIs and SDKs
sustainable business models
new Web programming technologies
14. Which of the following is the most complex level of data analytics?

Prenoscriptive
Predictive
Bounded
Denoscriptive
15. New business models, strategies, and performance capabilities frequently result from:

government subsidies.
corporate greed.
advances in technology.
serendipity.
16. All of the following are examples of the influence of social, mobile, analytics, and cloud technologies except ____.

Connections and feedback via social networks have changed the balance of influence.
Customer loyalty and revenue growth depend on a business� ability to offer unique customer experiences that wow customers more than competitors can.
Customers expect to use location-aware services, apps, alerts, social networks, and the latest digital capabilities at work and outside work.
Consumers are less likely to trust tweets from ordinary people than recommendations made by celebrity endorsements.
#إدارة_تكنولوجيا_المعلومات
#نماذج_إدارة_تكنولوجيا_المعلومات
#نبيل_الصهيبي
#IT_Management
4