Subject (SQ): Business Management and Information Systems

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Topics

  • Filter by Levels

BMIS – L1 – SA – Q18.8 – Machine Learning

Defines the process of a computer system developing intelligence.

The process through which a computer system develops intelligence is known as which of the following?

A   Artificial intelligence

B   Machine learning

C   Robotic process automation

D   Computer programming

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.8 – Machine Learning"

BMIS – L1 – SA – Q18.7 – Authentication

Identifies the security process for internet banking access.

To gain access to internet banking, a customer is required to input a password and supply a one-time code that has been sent to their mobile phone. This is an example of which of the following?

A   Two-factor authentication

B   Physical access control

C   Digital certificate

D   Enforced authorisation

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.7 – Authentication"

BMIS – L1 – SA – Q18.6 – Cryptocurrencies

Classifies cryptocurrencies as an example of a specific technology or asset.

Cryptocurrencies are an example of which of the following?

A   Digital Asset

B   Blockchain technology

C   Distributed ledger

D   Digital wallet

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.6 – Cryptocurrencies"

BMIS – L1 – SA – Q18.5 – Internet Identification

Defines a code that uniquely identifies a computer on the internet.

Which of the following can be defined as a code that uniquely identifies a particular computer on the internet?

A   IP address

B   Serial number

C   Server address

D   Domain name

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.5 – Internet Identification"

BMIS – L1 – SA – Q18.4 – Web Hosting Types

Identifies which option is not a type of web hosting.

Which of the following is NOT a type of Web hosting?

A   Dedicated

B   Weblog

C   Two-dimension

D   Clustered

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.4 – Web Hosting Types"

BMIS – L1 – SA – Q18.3 – Web Hosting

Identifies which factor is least relevant when selecting a web host.

Key considerations when selecting a web host would least likely include which of the following:

A   VHF compatibility

B   Bandwidth

C   Number of domains required

D   Up-time percentage

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.3 – Web Hosting"

BMIS – L1 – SA – Q18.2 – Internet Protocol

Defines what an Internet Protocol (IP) address is.

The definition of an Internet Protocol (IP) address is:

A   Another name for an email address

B   A code that uniquely identifies a particular computer on the Internet denoted by four sets of numbers from 0 to 999

C    A physical computer dedicated to running one or more services to serve the needs of users and other computers on a network

D   A code that uniquely identifies a particular computer on the internet denoted by four sets of numbers from 0 to 255

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.2 – Internet Protocol"

BMIS – L1 – SA – Q18.1 – IS Security

Identifies which option is not a method for keeping data secure.

Information should be easily accessible when it is needed, but it is also important to keep data secure. Which ONE of the following is NOT a method of keeping data secure?

A   WANs

B   Back-up files

C   Anti-virus software

D   Encrypted data

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q18.1 – IS Security"

BMIS – L1 – SA – Q17.5 – Introduction to Information Technology and Information Systems

Determines the type of information needed by an operational manager.

An operational manager would need information:

A   in summary form

B   about the organisation as a whole

C   prepared frequently

D   relevant to the long-term

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q17.5 – Introduction to Information Technology and Information Systems"

BMIS – L1 – SA – Q17.4 – Introduction to Information Technology and Information Systems

Identifies an external source of strategic management information.

A large proportion of strategic management information comes from external sources such as:

A   management reports

B   government statistics

C   sales systems

D   on the spot observation

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – L1 – SA – Q17.4 – Introduction to Information Technology and Information Systems"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan