Educational Technology MCQs

Educational Technology MCQs

Try to answer these 70+ Educational Technology MCQs and check your understanding of the Educational Technology subject.
Scroll down and let's begin!

1: _____ can process many pieces of data at the same time and learn to recognize patterns.

A.   Knowledge users

B.   Neural networks

C.   Streaming video

D.   Adobe Photoshop

2: _____ computer languages are machine independent and are called high-level languages.

A.   First-generation

B.   Second-generation

C.   Third-generation

D.   Fourth-generation

3: _____ do not need any previous training in computers or expert systems.

A.   Domain experts

B.   Knowledge users

C.   Knowledge engineers

D.   Intelligent agents

4: _____ is a database management system (dbms) that is suitable for a large organization.

A.   Microsoft Access

B.   FileMaker Pro

C.   Oracle

D.   Java

5: ________ are designed to have a generalized capability to learn.

A.   Knowledge-based systems

B.   Neural networks

C.   Fuzzy logic systems

D.   Expert systems

6: ________ often are designed and optimized for the specific tasks to be performed.

A.   LMS

B.   Virtual simulators

C.   CAD stations

D.   Knowledge workstations

E.   Graphics programs

7: ____________________ is data about data.

A.   Information

B.   Database design

C.   Knowledge

D.   Metadata

8: ________ tools and techniques process data and do statistical analysis for insight and discovery.

A.   Operational intelligence

B.   Business intelligence

C.   Information accessibility

D.   Information fluidity

9: At the level of middle management, the database must be able to _____.

A.   Documentation of the daily operations help pinpoint causes and solutions of database problems

B.   Procedure

C.   Provide the data necessary for tactical decisions and planning

D.   Front-end

10: Behavior modification is a training method that is primarily based on _____.

A.   Theory of identical elements

B.   Recall of training content

C.   Social learning theory

D.   Reinforcement theory

11: Big data primarily deals with ______________ data.

A.   Semi-structured, Structured and Unstructured

B.   Bit, byte, field, record, file, database

C.   Excel

D.   False

12: Data warehouses store _________ data, used primarily by _______ companies.

A.   Historical; large

B.   Historical; small

C.   Real-time; large

D.   Real-time; small

13: E-commerce sites use _____ to send notifications on new products and services.

A.   Data-mining tools

B.   E-mail

C.   Reverse

D.   Exception

14: Fuzzy logic, expert systems, and case-based reasoning are all _______ used with decision making.

A.   Intelligent techniques

B.   Executive support systems

C.   Group decision support systems

D.   Inference engines

E.   Structured decision systems

15: In an expert system, the _____ is the component that delivers the expert advice.

A.   Inference engine

B.   Explanation facility

C.   The decision makers and the knowledge base

D.   Knowledge repository

16: In terms of information systems, wikipedia would be an example of _________.

A.   A personal IS

B.   A group IS

C.   An enterprise IS

D.   An organizational complement

17: Knowledge workers are professionals who ________.

A.   Offshoring

B.   Outsourcing

C.   Chief information officer

D.   Create, modify, and/or synthesize knowledge as a fundamental part of their jobs

18: Social network analysis is a technique that attempts to ________.

A.   Discover hidden predictive relationships in the data

B.   Analyze why a key indicator is not at an appropriate level or why an exception occurred

C.   Allow hypothetical changes to the data associated with a problem and observe how these changes influence the results

D.   Find groups of people who work together

E.   Analyze large data warehouses to detect changes deemed important by a user

19: System administration, networking, and security organization is better known as __________.

A.   SAN

B.   SANSO

C.   SANO

D.   SANS

20: When video files are played while being downloaded from the internet, it is called _____.

A.   Video streaming

B.   Natural selection

C.   Knowledge base

D.   Neural networks

21: User-access management is a subset of _____.

A.   Password protection

B.   Authorization management

C.   Data integrity management

D.   Managerial control

22: Users typically access data as needed from a database management system by using ________.

A.   BI tools

B.   SQL

C.   Transaction processing

D.   Data filtering

A.   Hyperlinks

B.   Underlined

C.   E-mail address

D.   Inline

24: Behavior modeling is a training method that is primarily based on _____.

A.   Goal setting theory

B.   Social learning theory

C.   Expectancy theory

D.   Reinforcement theory

25: ________ is a technique for harnessing the power of thousands of computers working in parallel.

A.   Granularity

B.   RFM analysis

C.   Reposition

D.   MapReduce

26: ________ systems help organizations manage both structured and semistructured knowledge.

A.   Knowledge work

B.   Enterprise content management

C.   Digital asset management

D.   Knowledge network

27: All of the following are valid payment methods for electronic commerce except ________.

A.   Apple Pay

B.   Square

C.   Google Wallet

D.   TechPay

28: An online auction is based on the _____ business model of e-commerce.

A.   EDI is more beneficial when there are more companies in the EDI network.

B.   False - includes the following activities: sales automation, order processing, marketing automation, customer support, knowledge management, and personalization technology

C.   The Internet

D.   Brokerage

29: A case study _____.

A.   Is a training method that replicates the physical equipment

B.   Is a description about how employees or an organization dealt with a difficult situation

C.   Involves assisting a certified tradesperson

D.   Involves observing peers performing a case and then trying to imitate their behavior

A.   Byte

B.   Field

C.   Record

D.   File

E.   Database

31: An ________ and an olap report are the same thing.

A.   OLAP measure

B.   OLAP cube

C.   OLAP dimension

D.   OLAP array

32: In the context of tracking, students are sorted based on _____.

A.   K-8 schools

B.   Alcohol

C.   Friends

D.   Ability

33: Medical informatics is widely used in the combined disciplines of computer science and _________.

A.   Medical research

B.   Online Research

C.   Physical Research

D.   None of these

34: The expert system knowledge acquisition facility serves as an interface between _____.

A.   System developers and explanation facilities

B.   End users and inference engines

C.   Decision makers and the knowledge bases

D.   Experts and knowledge bases

35: You will create your personal strategy card in the __________ phase of metacognition

A.   Rehearse

B.   1st phase

C.   Avoid.

D.   Sequence

36: _____ is an example of context-based learning created and guided by companies.

A.   Lecture

B.   Mentoring

C.   Coaching

D.   A simulation

37: Business intelligence systems generate business intelligence by __________ data.

A.   Market-based analysis

B.   Intelectual capital

C.   Reporting; data mining

D.   Identifying patterns in

38: Enterprise resource planning (erp) takes mrp one step further because it ________.

A.   Undertakes a plan-do-check-act (PDCA) cycle

B.   Performs inventory control and process scheduling for manufacturing

C.   Electronically tracks the status and quantity of each item in the system

D.   Integrates inventory control and process scheduling with a firm's finance, marketing, and HR functions

E.   Allows materials to be ordered only as they are needed

39: Twitter is an example of _____.

A.   Retailing online ordering service.

B.   Micro-blogging tool.

C.   Hyperlink to online car auctions.

D.   Buzz agent.

E.   Short-message service

40: Unwanted or junk e-mail is called ________.

A.   Spam

B.   Spyware

C.   Adware

D.   Malware

41: The jpeg images taken by most digital cameras today use 24-bit ____.

A.   Mega color images

B.   True color images

C.   Real color images

D.   Full color images

42: Web pages are viewed using a web ____.

A.   Username

B.   Browser

C.   History

D.   Green

43: A key feature of online analytical processing is the ability to ________.

A.   Predict

B.   Drill down

C.   Confound

D.   Explain

E.   Retract

44: Isp stands for ________.

A.   Internet Survey Period

B.   Integrated Service Provider

C.   Internet Security Protocol

D.   Internet Service Provider

45: Companies can make vast amounts of information available to customers through their _____ sites.

A.   Intranet

B.   Extranet

C.   Telecommuting

D.   Cyberliability

46: A data administrator is also known as a(n) _____.

A.   Data security officer

B.   Systems administrator

C.   Information resource manager

D.   Information engineering officer

47: Eavesdropping usually is more of a concern for ________ lans than for ________ lans.

A.   Wired, wireless

B.   Wireless, wired

C.   About an equal concern for wired and wireless LANs

D.   None of the above

48: _____ prefer blended learning.

A.   Traditionalists

B.   Baby Boomers

C.   Millennials

D.   Gen Xers

49: Computers gather data, which means that they allow users to ________ data.

A.   Present data

B.   Input data

C.   Output data

D.   Store data

50: ____ literacy is an essential component of information literacy.

A.   Numerical

B.   Graphical

C.   Grammatical

D.   Statistical