Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CIS Exam 1

TermDefinition
focus Which of the following strategies was identified by Michael Porter to successfully compete in the marketplace?
analyzed facts Identify the output of an information system.
providing information in a useful format for decision-making purposes The final task in designing a management information system (MIS) is _____.
supplier In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options.
differentiation strategy Which of the following strategies is identified by Michael Porter for successfully competing in the marketplace?
database administrator (DBA) In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.​
they focus on data collection and processing Identify the true statement about transaction-processing systems
information Identify the component of an information system that consists of facts analyzed by the process component.
data The _________ component of an information system is considered the input to the system.
it allocates human and financial resources Identify a true statement about personnel information system (PIS).
selecting the best modes of transportation Which of the following decisions is supported by a logistics information system (LIS)?
differentiation strategy Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?
timeliness To be useful, information must have the quality of _____.
providing an inexpensive medium for targeting a large customer base Social networking sites can reduce organizations’ costs by _____.
they are flexible and easy to use Why do information systems use graphical user interfaces (GUIs)?
marketing information systems (MKIS) What system is used for forecasting sales?
threat of new entrants Which of the following is one of the forces of the Five Forces Model identified by Michael Porter?
It is a network within an organization that uses Internet protocols and technologies. Identify the true statement about intranets
It focuses on generating new revenue by offering new products and services. In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy.
it is considered to be the input for an information system Identify the true statement about the data component of an information system.
labor statistics _____ is an external data source of an information system.
produce information in different formats To be useful, information systems should _____
database administrator In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools.
business intelligence Identify the term that provides historical and predictive views of business operations.
computer literacy _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
serial port A(n) _____ is a communication interface through which information is transferred one bit at a time.
parallel port A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
silicon cannot emit light and has speed limitations Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide.
kernel The supervisor program in an operating system (OS) is called the _____.
The contents of programmable read-only memory cannot be reprogrammed. identify a true statement about memory devices.
byte A _____ is the size of a character.
remote access servers An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources?
computer-aided design _____ software is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils.
random access memory (RAM) The Clipboard’s contents are typically stored in _____.
bus A _____ is a link between devices connected to a computer.
assembly language Identify a computer language that is machine dependent.
cloud _____ storage, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties.
microsoft windows Which of the following is the OS for most PCs and belongs to the system software group?
third-generation _____ computer languages are machine independent and are called high-level languages.
disk drive A _____ is a peripheral device for recording, storing, and retrieving information.
An inkjet printer uses multicolored ink cartridges to print digital photographs. Which of the following statements is true of inkjet printers?
128 An ASCII file defines up to _____ characters.
storage _____ means saving data in computer memory.
high-level Java and C++ are _____ languages.
Laser printers use toners to create high-quality output. Identify a true statement about laser printers.
liquid crystal display A(n) _____ is a common output device for soft copy.
256 Extended ASCII data code allows representation of _____ characters.
redundant array of independent disks Extended ASCII data code allows representation of _____ characters.
remote data entry Third-generation computers introduced _____.
It is a set of programs for controlling and managing computer hardware and software Which of the following best defines an operating system?
it focuses on improving efficiency by reducing overall costs In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy.
It helps the organization reduce cost of products and services. Identify how information systems help an organization.
It focuses on generating new revenue by offering new products and services. In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy.
buyer power _____ is high when customers have many choices and low when they have few choices.
chief technology officer The top information systems job belongs to the _________.
information literacy Identify the term used for understanding the role of information in generating and using business intelligence.
commercial programs Identify the software components of a management information system (MIS).
They are used to create, organize, and manage databases. Identify a true statement about database management systems.
Aggregated data enables decision makers to focus on specific factors. Which of the following statements is true about data?
network administrator In the context of information technology (IT) jobs, in the information systems field, a _________ is typically responsible for providing network and cybersecurity.​
data The _________ component of an information system is considered the input to the system.
social networking sites _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
supplier In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options.
computer literacy _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
information Identify the component of an information system that consists of facts analyzed by the process component.
process The purpose of an information system’s _____ component is generating the most useful type of information for making decisions.
context aware computing Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as _____.
selecting the best modes of transportation Which of the following decisions is supported by a logistics information system (LIS)?
database management system Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____.
business intelligence Identify the term that provides historical and predictive views of business operations.
operating system UNIX is a type of _____.
data codes Computers and communication systems use _____ to represent and transfer information between computers and network systems.
mouse A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning.
secondary memory _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.
third-generation _____ computer languages are machine independent and are called high-level languages.
program A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand.
random access memory (RAM) Which of the following memory devices allows data to be read and written?
The contents of programmable read-only memory cannot be reprogrammed. identify a true statement about memory devices
optical mark recognition (OMR) system Identify an input device used to grade multiple-choice and true/false tests.
ROM is nonvolatile memory, whereas RAM is volatile memory. How is read-only memory (ROM) different from random access memory (RAM)?
8 The word computer consists of 64 bits, which is equivalent to _____ bytes.
binary number Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
optical storage A write once, read many (WORM) disc is a common type of _____.
American Standard Code for Information Interchange Identify the file in which each alphabetic, numeric, or special character is represented with a 7-bit binary number.
vacuum tube technology Beginning in the 1940s, first-generation computers used _____
remote data entry Third-generation computers introduced _____.
redundant array of independent disks A _____ allows data to be stored in multiple places to improve a system’s reliability.
occupy less space than a mouse Trackballs are ideal for notebook computers because they _____.
database engine The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval.
it uses more sophisticated security measures Identify an advantage of using a database over a flat file system.
external and internal The database component of an information system can generate sufficient business intelligence by accessing the _____ data of an organization.
indexed sequential access method Identify a file structure that is similar to a book index that lists page numbers where certain topics can be found.
raw data In data warehouses, _____ is information in its original form.
AND The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met
store multidimensional data Data warehouses are sometimes called “hypercubes” because they _____.
warehouse A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
data mining tools Business analytics uses _____ to support decision-making activities.
project In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.
data mart A _____ is usually a smaller version of a data warehouse, used by a single department or function.
create, read, update, and delete In the context of data administration component, the acronym CRUD stands for _____.
mobile and wireless technology Which of the following is a key factor that has contributed to the growth and popularity of big data?
attributes In a relational database model, the columns are known as _____.
operations Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
enterprise resource planning systems Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports?
logical structure To begin designing a relational database, one must define the _____ by defining each table and the fields in it.
developing recovery procedures in case data is lost or corrupted A database administrator is responsible for _____.
allocation The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication.
integrity rules _____, a component of a data model, defines the boundaries of a database, such as maximum and minimum values allowed for a field.
summary data In data warehouses, _____ gives users subtotals of various categories, which can be useful.
select In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.
metadata In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics.
administration The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
data definition The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.
Web server Whenever a user accesses the same domain, the browser sends saved information to the _________.
They let independent customers share skills and have access to each other’s markets via information technologies. Which of the following is true about virtual organizations?
nonrepudiation In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
cybersquatting _____ is registering, selling, or using a domain name to profit from someone else’s trademark.
accountability In the context of Web and network privacy, _____ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.
trademark A _________ is an intellectual property that protects product names and identifying marks.​
industrial In the context of intellectual properties, inventions are categorized as _________ properties.​
spam In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _________.​
Copyright Act The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
Copyrights’ length vary based on the type of work. Identify a true statement about copyrights.
Communications Decency Act The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment.
reduces employee turnover A potential benefit of telecommuting is that it _____.
cookies Which of the following is a commonly used technology for data collection?
By using video conferencing, electronic meeting systems, and groupware In which of the following ways can green computing be achieved?
digital divide Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
Organizations can use patents to keep competitors from entering certain market segments. Which of the following is a benefit of using patents in organizations?
URL hijacking _________ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.​
copyright _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
The speed of the Internet connection also plays a role in digital divide discussion. Identify a true statement about information technology in social divisions.
legal and ethical A software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When his manager, discovers that he had intentionally spread the virus, he immediately fires Alfred. The manager's behavior is considered
upgrading In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.
Companies respond to customers faster and more efficiently. Which of the following statements is true of virtual organizations?
when experienced labor is eliminated by high technology In the context of information technology in workplaces, when does job deskilling occur?
skills are shared among participating companies of a virtual organization In the context of virtual organizations, the cost of hiring additional employees is reduced because _____.
green computing _________ is computing that promotes a sustainable environment and consumes the least amount of energy.​
social engineering In the context of security threats, _________ means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.​
signature analysis Which of the following is a biometric security measure?
pharming Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers.
secure sockets layer _____ is a commonly used encryption protocol that manages transmission security on the Internet.
front-end servers A level 1 security system is used to protect _____ against unauthorized access.
computer fraud _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.
Trojan programs In the context of intentional threats, _____ can erase data and wreak havoc on computers and networks, but they do not replicate themselves.
back-end systems To ensure confidentiality, accuracy, and integrity of data, a level 2 security system protects _____.
firewall A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
sniffing _____ is the process of capturing and recording network traffic.
phishing _________ is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.​
proxy server In nonbiometric security measure, a _____ is a software that acts as an intermediary between two systems.
firewalls Which of the following is a nonbiometric security measure?
symmetric _____ encryption is also known as secret key encryption.
It occurs when an illegitimate program poses as a legitimate one. when does spoofing occur?
Firewalls protect against external access and not from internal intrusions. identify a true statement about firewalls
biometric security measure Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.
intrusion detection systems _____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
business continuity planning _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
fault-tolerant systems When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.
It is an independent program that can spread itself without attaching itself to a host program. Which of the following is true of a worm?
confidentiality In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
It involves sending fraudulent e-mails that seem to come from legitimate sources. Which of the following is true of phishing?
spyware _________ is software that secretly gathers information about users while they browse the Web.
worm A _____ travels from computer to computer in a network but it does not usually erase data.
broadband In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
time division multiple access (TDMA) In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
radiated Communication media that use an antenna for transmitting data through air or water are called _________ media.
hierarchical topology Identify a topology used by traditional mainframe networks.
ethernet A(n) _____ cable is used to connect computers, hubs, switches, and routers to a network
radiated media Transmission of data across satellites is through _____.
ring topology In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.
digital subscriber line (DSL) _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
protocol _________ is a set of rules that govern data communication, including error detection, message length, and transmission speed.
integrate services to a single building or campus Local area networks (LANs) are used to _____.
It requires major network upgrades, because video requires much more bandwidth. Identify a true statement about convergence in data communication.
network layer Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates.
speed of its interconnections The data transfer speed of a wide area network (WAN) depends on the _____.
bandwidth The amount of data that can be transferred from one point to another in one second is called _____.
fiber-optic _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.
nodes on a network A routing table lists _____.
Asynchronous Transfer Mode (ATM) In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps.
transport layer Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data.
multiplexer A _____ is a hardware device that allows several nodes to share one communication channel.
WPA (Wi-Fi Protected Access) _________ is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques.
tree A hierarchical topology is also called a _____ topology.
adding more workstations Horizontal scaling of client/server architecture means _____.
An n-tier architecture helps improve network performance Identify a true statement about the types of client/server architecture.
it handles steady traffic well Identify an advantage of the bus topology.
internet protocol (IP) _____ is responsible for packet forwarding.
Assymetric DSL (ADSL) _____ has a lower transmission rate upstream than downstream.
/˜hbidgoli In the URL _____ represents the name of the directory in which files are stored.
XML tags represent the kind of content being posted and transmitted. Which of the following statements is true of Extensible Markup Language (XML)?
hyphens Which of the following can be used in domain names in uniform resource locators (URLs)?
gigapop A _________ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth.​
IP addresses DNS (Domain Name System) servers translate all domain names into _____.
directories _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.
Web 3.0 The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs.
server Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____.
Intranets help move from calendar-based document-publishing strategy to one that is based on needs. In the context of an organization, which of the following statements is true of an intranet?
Geographic TLDs are used to promote business and tourism. Which of the following statements is true of geographic top-level domains (TLDs)?
crawlers _____, a software used by search engines, can go through the other pages that are part of a Web site, as long as there are links to those pages.
blog A _____ is a journal or newsletter that is updated frequently and intended for the general public.
With VoIP, users can have calls forwarded from anywhere in the world. Identify a true statement about Voice over Internet Protocol (VoIP).
uniform resource locator (URL) A(n) _____ is the address of a document or site on the Internet.
hypermedia The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
voice over internet protocol (VOIP) _________ is the protocol used for Internet telephony
client-based Microsoft Outlook is an example of a _____ e-mail program.
SMTP Which of the following protocols is used to send e-mails?
podcast Syndication feeds are one way of announcing the availability of a _____.
domain names _____ are unique identifiers of computer or network addresses on the Internet.
The call quality is not as good as it is with regular phone lines Which of the following is a drawback of Internet telephony?
instant messaging (IM) _________ is an Internet service for communicating with others via a private “chat room” on the Internet.
teleimmersion system A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.
Web 3.0 Which of the following is also known as “the Semantic Web”?
They focus on data collection and processing. Identify the true statement about transaction-processing systems.
Analysis of price changes and discounts Which of the following decisions is supported by a manufacturing information system (MFIS)?
timeliness To be useful, information must have the quality of _____.
It helps the organization reduce cost of products and services. Identify how information systems help an organization.
webmaster In the context of the information technology (IT) jobs, in the information systems field, a _________ designs and maintains the organization’s Web site.​
Information literacy Identify the term used for understanding the role of information in generating and using business intelligence.
computer literacy _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
know how and why data is collected To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____.
They are flexible and easy to use. Why do information systems use graphical user interfaces (GUIs)?
pervasive analytics Building and integrating analytics capabilities into all everyday business activities is known as _____.
They can automate repetitive operations. Which of the following statements is true of transaction-processing systems?
analyzed facts Identify the output of an information system.
supplier In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options
information Identify the component of an information system that consists of facts analyzed by the process component.
Differentiation strategy Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?
computer literacy _________ means having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies.​
Aggregated data enables decision makers to focus on specific factors. Which of the following statements is true of data?
short-message service Twitter is an example of _________.
produce information in different formats To be useful, information systems should _____.
Determining portfolio structures Which of the following decisions is supported by a financial information system (FIS)?
database administrator (DBA) In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.​
Social networking sites _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
chief technology officer The top information systems job belongs to the _________.
It focuses on improving efficiency by reducing overall costs. In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy.
Twitter _____ is a social networking Web site.
Remote access servers An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources?
optical storage A write once, read many (WORM) disc is a common type of _____.
byte A _____ is the size of a character
occupy less space than a mouse Trackballs are ideal for notebook computers because they _____.
Laser printers use toners to create high-quality output. Identify a true statement about laser printers.
The contents of programmable read-only memory cannot be reprogrammed. Identify a true statement about memory devices.
redundant array of independent disks A _____ allows data to be stored in multiple places to improve a system’s reliability.
random access memory (RAM) Which of the following memory devices allows data to be read and written?
liquid crystal display A(n) _____ is a common output device for soft copy.
ROM is nonvolatile memory, whereas RAM is volatile memory. How is read-only memory (ROM) different from random access memory (RAM)?
Silicon cannot emit light and has speed limitations. Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide.
8 The word computer consists of 64 bits, which is equivalent to _____ bytes.
parallel port A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
An inkjet printer uses multicolored ink cartridges to print digital photographs. Which of the following statements is true of inkjet printers?
it is less fragile than gallium arsenide An advantage of silicon over gallium arsenide is that _____.
Third-generation _____ computer languages are machine independent and are called high-level languages.
It is a set of programs for controlling and managing computer hardware and software. Which of the following best defines an operating system?
Microsoft Windows Which of the following is the OS for most PCs and belongs to the system software group?
It controls all the programs in the OS to perform special tasks. Identify a true statement about the supervisor program.
Assembly language Identify a computer language that is machine dependent.
mouse A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning.
secondary memory _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.
vacuum tube technology Beginning in the 1940s, first-generation computers used _____.
kernel The supervisor program in an operating system (OS) is called the _____.
random access memory (RAM) The Clipboard’s contents are typically stored in _____.
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. Which of the following statements is true of data marts and data warehouses?
Sales records In a database, which of the following is a source of internal data?
Mobile and wireless technology Which of the following is a key factor that has contributed to the growth and popularity of big data?
Enterprise resource planning systems Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports?
structured data and unstructured data The variety dimension of big data refers to a combination of _____.
Significant improvements in storage technology Which of the following factors has made big data analytics accessible to nearly all types of organizations?
Only one Identify the number of physical views of data for a database.
attributes In a relational database model, the columns are known as _____.
focuses on a specific area In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____.
distributed database A(n) _____ is not limited by the data’s physical location.
warehouse A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
store multidimensional data Data warehouses are sometimes called “hypercubes” because they _____.
AND The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met.
allocation The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication.
Tax records Which of the following is an example of a source for external data?
foreign In a relational database model, when a primary key for one table appears in another table, it is called a _____ key.
hierarchical In a(n) _____ model, nodes with the same parents are called siblings.
extraction In a data warehouse, _____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
data model The first step in database design is defining a _____, which defines how data is created, represented, organized, and maintained.
database engine The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval.
data dictionary The _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field.
logical structure To begin designing a relational database, one must define the _____ by defining each table and the fields in it.
metadata In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics.
Data in a flat file system may not be updated in all files consistently. Identify a true statement about a flat file system.
It is a result of exponential growth of data in both public and private organizations. Which of the following statements is true of big data?
CyberSitter Identify a program used by parents to prevent their children’s access to certain Web sites.
public _____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.
smart In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ cards are being developed.
The speed of the Internet connection also plays a role in digital divide discussion. Identify a true statement about information technology in social divisions
patent A _________ is an intellectual property that protects new processes.​
typosquatting When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
Products are customized more to respond to customers’ needs. In the context of information technology in workplaces, which of the following is an advantage of virtual organizations?
By using video conferencing, electronic meeting systems, and groupware In which of the following ways can green computing be achieved?
Green computing _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
acceptable use policy In the context of privacy issues, in an organization, a new employees have to sign a(n) _________ before they access the network.
Copyrights’ length vary based on the type of work. Identify a true statement about copyrights.
Copyright _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
They let independent customers share skills and have access to each other’s markets via information technologies. Which of the following is true about virtual organizations?
legal but unethical A credit card company sells its customers’ mailing addresses to its competitors. In this scenario, the company’s action is considered _____.
Spamming _____ can rise to an unmanageable level quickly, clogging users’ in-boxes and preventing access to legitimate e-mails.
Net neutrality Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
upgrading In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.
skills are shared among participating companies of a virtual organization In the context of virtual organizations, the cost of hiring additional employees is reduced because _____.
Copyright Act The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
digital divide Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
use verification procedures to ensure data accuracy To minimize the invasion of privacy, users and organizations should _____.
Cybersquatting _____ is registering, selling, or using a domain name to profit from someone else’s trademark.
Web server Whenever a user accesses the same domain, the browser sends saved information to the _________.
Communications Decency Act The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment.
Organizations can use patents to keep competitors from entering certain market segments Which of the following is a benefit of using patents in organizations? AND
AND The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met.
sequential access file structure The _____ method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.
database engine The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval.
warehouse A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
Tax records Which of the following is an example of a source for external data?
hierarchical In a(n) _____ model, nodes with the same parents are called siblings.
tuples In a relational database model, the rows are known as _____.
Operations Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
data manipulation The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database.
Indexed sequential access method Identify a file structure that is similar to a book index that lists page numbers where certain topics can be found.
data mining tools Business analytics uses _____ to support decision-making activities.
structured data and unstructured data The variety dimension of big data refers to a combination of _____.
foreign In a relational database model, when a primary key for one table appears in another table, it is called a _____ key.
network In a(n) _____ model, each record can have multiple parent and child records.
create, read, update, and delete In the context of data administration component, the acronym CRUD stands for _____.
It uses more sophisticated security measures. Identify an advantage of using a database over a flat file system.
focuses on a specific area In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____.
raw data In data warehouses, _____ is information in its original form
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. Which of the following statements is true of data marts and data warehouses?
store multidimensional data Data warehouses are sometimes called “hypercubes” because they _____.
project In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.
Only one Identify the number of physical views of data for a database.
select In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.
administration The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
summary data In data warehouses, _____ gives users subtotals of various categories, which can be useful.
reduces employee turnover A potential benefit of telecommuting is that it _____.
Copyrights’ length vary based on the type of work. Identify a true statement about copyrights.
Companies respond to customers faster and more efficiently. Which of the following statements is true of virtual organizations?
Cybersquatting _____ is registering, selling, or using a domain name to profit from someone else’s trademark.
Log files _____, which are generated by Web server software, record a user’s actions on a Web site
skills are shared among participating companies of a virtual organization In the context of virtual organizations, the cost of hiring additional employees is reduced because _____.
cookies Which of the following is a commonly used technology for data collection?
Lack of necessary supplies or equipment Which of the following is a potential drawback of telecommuting?
not charge different rates on data According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____.
CyberSitter Identify a program used by parents to prevent their children’s access to certain Web sites.
The speed of the Internet connection also plays a role in digital divide discussion Identify a true statement about information technology in social divisions.
legal but unethical Clement applies for a home loan at a bank. As part of the process, he provides his personal details to the bank. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____
trademark A _________ is an intellectual property that protects product names and identifying marks.​
reliability To minimize the invasion of privacy, any organization creating, maintaining, using, or disseminating records of personal data must ensure the data’s _____.
illegal and unethical Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua. In this scenario, Jared’s actions are considered _____.
censorship In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.
copyrights In general, _____ last the author’s lifetime plus 70 years.
Green computing _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
They let independent customers share skills and have access to each other’s markets via information technologies Which of the following is true about virtual organizations?
cookies _____ provide information about a user’s location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage.
virtual _________ organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.​
trademarks In the context of intellectual property, which of the following is categorized as industrial property?
social security numbers A common way to index and link databases is by using _________.
needed for the stated purpose To minimize the invasion of privacy, organizations should keep collected information only as long as it is _____. `
Copyright Act The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
Firewalls protect against external access and not from internal intrusions. Identify a true statement about firewalls.
Computer fraud _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.
Spyware is software that secretly gathers information about users while they browse the Web. What is Spyware?
Passwords Which of the following is a type of access control used to protect systems from unauthorized access?
backdoor In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer.
Asymmetric _____ encryption usually works better for public networks, such as the Internet.
blended A _________ threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
Signature analysis Which of the following is a biometric security measure?
corporate networks A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access.
integrity In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
Ciphertext Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
blended threat In the context of security threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
Sabotage _____ is a computer crime that involves destroying or disrupting computer services.
social engineering In the context of security threats, _____ takes advantage of the human element of security systems.
availability In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
​Asymmetric _____ encryption uses a public key known to everyone and a private key known only to the recipient.​
front-end servers A level 1 security system is used to protect _____ against unauthorized access.
Secure Sockets Layer In data encryption, the indicates a safe HTTP connection over _____.
denial-of-service attack In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system.
Physical _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
It involves sending fraudulent e-mails that seem to come from legitimate sources. Which of the following is true of phishing?
firewall A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.​
It occurs when an illegitimate program poses as a legitimate one. When does spoofing occur?
​symmetric ​In _____ encryption, the same key is used to encrypt and decrypt a message.
Adware _________ is a form of spyware that collects information about a user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.
speed of its interconnections The data transfer speed of a wide area network (WAN) depends on the _____.
decentralized In _____ processing, each department has its own computer for performing processing tasks.
centralized A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
Digital subscriber line (DSL) _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
Asynchronous Transfer Mode (ATM) In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps.
Coaxial cables _____ are conducted media, which can be used for both data and voice transmissions.
It ensures a tight control over system operations and applications. Identify an advantage of centralized processing.
Network layer Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates.
WPA2 (Wi-Fi Protected Access 2) A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key?
transport The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
adapter card Computers in a local area network (LAN) are usually connected to the network via a(n) _____, which is a hardware component.
It handles steady traffic well. Identify an advantage of the bus topology.
mobile A _____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
broadband In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
It requires major network upgrades, because video requires much more bandwidth. Identify a true statement about convergence in data communication.
hierarchical topology A _________ works well for companies that are geographically dispersed.​
conducted In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.​
The user creates a query by running client software. Which of the following events takes place in the most basic client/server configuration?
Fiber-optic _____ cables have the highest bandwidth of any communication medium.
WPA (Wi-Fi Protected Access) _________ is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques.
Fiber-optic _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.
RF spectrum Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _________ as the communication medium.​
Open Systems Interconnection (OSI) The _________ model is a seven-layer architecture for defining how data is transmitted from computer to computer in a network.​
radiated media Transmission of data across satellites is through _____.
routing The process of deciding which path data takes on a network is called _____.
denial-of-service attack In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system.
corporate networks A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access.
Backdoors Which of the following is considered an intentional security threat?
It involves sending fraudulent e-mails that seem to come from legitimate sources Which of the following is true of phishing
blended threat In the context of security threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
Ciphertext Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
When programs suddenly increase in size Which of the following indicates that a computer might be affected by a virus?
Passwords Which of the following is a type of access control used to protect systems from unauthorized access?
Sabotage _____ is a computer crime that involves destroying or disrupting computer services.
​symmetric ​In _____ encryption, the same key is used to encrypt and decrypt a message.
Firewalls protect against external access and not from internal intrusions. Identify a true statement about firewalls.
worm A _____ travels from computer to computer in a network but it does not usually erase data.
Computer fraud _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.
Spyware _____ can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers.
front-end servers A level 1 security system is used to protect _____ against unauthorized access.
backdoor In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer.
Physical _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
fault-tolerant systems When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.
It is an independent program that can spread itself without attaching itself to a host program. Which of the following is true of a worm?
provide information on security incidents The main function of Cyber Incident Response Capability (CIRC) is to _____.
virtual private network A(n) _____ is often used so remote users have a secure connection to an organization’s network.
social engineering In the context of security threats, _____ takes advantage of the human element of security systems.
McCumber cube The Committee on National Security Systems (CNSS) proposed another model for evaluating information security known as the _____.
Logic bomb Identify an intentional security threat that is a type of Trojan program used to release a virus, worm, or other destructive code.
Symmetric _____ encryption is also known as secret key encryption.
centralized A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
transport The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
Protocol _________ is a set of rules that govern data communication, including error detection, message length, and transmission speed.
speed of its interconnections The data transfer speed of a wide area network (WAN) depends on the _____.
Digital subscriber line (DSL) _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
It requires major network upgrades, because video requires much more bandwidth. Identify a true statement about convergence in data communication.
tree A hierarchical topology is also called a _____ topology.
Hierarchical topology Identify a topology used by traditional mainframe networks.
Network layer Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates.
packet A _________ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.
nodes on a network A routing table lists _____.
Transport layer Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data.
dynamic router A(n) _____ is a network connection device, which can build tables that identify addresses on each network.
Time Division Multiple Access (TDMA) In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
It ensures a tight control over system operations and applications. Identify an advantage of centralized processing.
multiplexer A _____ is a hardware device that allows several nodes to share one communication channel.
conducted In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.​
application The _____ layer of the Open Systems Interconnection (OSI) model serves as the window through which computer programs access network services.
Terrestrial microwave Which of the following media is based on line of sight
WPA2 (Wi-Fi Protected Access 2) A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key?
integrate services to a single building or campus Local area networks (LANs) are used to _____.
It solves the lack of responsiveness in centralized processing. Identify a true statement about distributed processing.
Physical and Data Link A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers.
terminator In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.
The user creates a query by running client software. Which of the following events takes place in the most basic client/server configuration?
Creation of online copyright-protection schemes continues to be a challenge. Which of the following statements is true of Web applications?
Cascading Style Sheets (CSS) In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________.​
Social networking _____ refer(s) to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies.
Internet backbone The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth.
IP addresses DNS (Domain Name System) servers translate all domain names into _____.
fiber-optic The Internet backbone is a foundation network linked with _____ cable(s) that can support very high bandwidth.
teleimmersion system A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.
keywords Housed at server farms, search engines use _____ to index data coming in from crawlers.
Internet telephony _________ is a service that uses the Internet rather than the network to exchange spoken conversations.
SMTP Which of the following protocols is used to send e-mails?
extranet A(n) _________ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so communication between organizations is possible.
Community TLDs are limited to members of a defined community. Which of the following statements is true of community top-level domains (TLDs)?
client-based Microsoft Outlook is an example of a _____ e-mail program.
XML tags represent the kind of content being posted and transmitted. Which of the following statements is true of Extensible Markup Language (XML)?
E-collaboration Which of the following is an important application of data communication systems for managers to contact decision makers located throughout the world?
Internet Relay Chat (IRC) _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time.
Pinterest Joey is a businessman. He develops cases and covers for mobile phones. He wishes to showcase his products so that more people know about his work. Which of the following will help him in promoting his products?
hypertext The embedded references in hypermedia documents are called _________.​
Podcasts _________ are usually collected by an “aggregator.
Discussion groups _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
Intranets help move from calendar-based document-publishing strategy to one that is based on needs. In the context of an organization, which of the following statements is true of an intranet?
hypermedia The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
.net _____ is a generic top-level domain name that is used for backbone, regional, and commercial networks.
Accuracy of information Which of the following is a serious problem with wikis?
podcast A(n) _____ is referred to as an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
search engines Google, Bing, and Ask.com are examples of _____.
Community TLDs are limited to members of a defined community. Which of the following statements is true of community top-level domains (TLDs)?
corporate portals Intranets are also called _____.
Directories _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.
Asymmetric DSL (ADSL) _____ has a lower transmission rate upstream than downstream.
uniform resource locator (URL) A(n) _____ is the address of a document or site on the Internet.
local area network (LAN) A client can be a home computer or a node in an organization’s _____.
Internet Protocol (IP) addresses When information is transferred from one network to another, domain names are converted to _________ by the Domain Name System (DNS) protocol.​
Internet telephony _________ is a service that uses the Internet rather than the network to exchange spoken conversations.
Discussion groups _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
Cascading Style Sheets (CSS) In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________.​
Crawlers _____, a software used by search engines, can go through the other pages that are part of a Web site, as long as there are links to those pages.
It is used to create Web pages. What is the use of Hyper Text Markup Language (HTML)?
An intranet is different from a local area network (LAN), although it uses the same physical connections. Identify a true statement about intranets.
Internet Relay Chat (IRC) _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time.
search engine A _____ is an information system that enables users to retrieve data from the Web by using keywords.
Web 3.0 The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs.
client-based Microsoft Outlook is an example of a _____ e-mail program.
Web browsers Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.
podcast A(n) _____ is referred to as an electronic audio file that is posted on the Web for users to download to their mobile devices or computers.
Internet backbone The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth.
Accuracy of information Which of the following is a serious problem with wikis?
An extranet _____ is considered a type of interorganizational system (IOS).
teleimmersion system A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.
/˜hbidgoli In the URL _____ represents the name of the directory in which files are stored.
do not have a physical location to help maintain current customers Service and support are even more important in e-commerce than in traditional commerce because e-commerce companies _____.
electronic payment A(n) _____ refers to exchange of money or scrip electronically.
splash screen A Web page displayed when a user first visits a site is called a(n) _____.
Push technology In Web marketing, identify the technology in which information is sent to users based on their previous inquiries, interests, or specifications.
Wireless Application Protocol Mobile commerce (m-commerce) is based on the _____.
business-to-business (B2B) Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks.
They are supported by short-range wireless communication technologies. Which of the following is true of mobile commerce (m-commerce) applications?
E-business _____ includes transactions that support revenue generation by generating demand for goods and services, offering sales support and customer service, facilitating communication between business partners, and similar activities.
margin The _____ represents the value added by supporting primary activities of a value chain.
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit. Identify a true statement about cookies.
hit Any element of a Web page that is clicked counts as a _____ to a server.
Improving customer service Which of the following is an advantage of e-commerce?
Price transparency _____, in e-commerce, means all market participants can trade at the same price.
Web sites E-commerce fulfills the product information activity using _____.
Brokerage model Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
ebXML allows you to select only the data requested in a search. In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML).
buyer-side marketplace A(n) _____ enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products initiated by a group of consumers.
Search engine optimization _____ is a method for improving the volume or quality of traffic to a Web site.
merchant model The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens. Identify a true statement about in-game mobile marketing.
intrabusiness E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.
The goal of selling products to generate profit is the same. Identify a similarity between e-commerce and traditional commerce.
E-procurement Identify an application of the seller-side marketplace model that has the main objective of preventing purchases from suppliers that are not on the approved list of sellers.
government-to-government (G2G) Crisis response is categorized as a _____ application.
Third-party exchange marketplace Identify a marketplace model that generates revenue from the fees charged for matching buyers and sellers.
merchant model The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.
Information sharing _____ is the first activity to be involved in a typical business-to-consumer (B2C) cycle.
Improving customer service Which of the following is an advantage of e-commerce?
Price transparency _____, in e-commerce, means all market participants can trade at the same price.
vertical market In a third-party exchange marketplace, the sale of medical products is an example of a(n) _____.
splash screen A Web page displayed when a user first visits a site is called a(n) _____.
buyer-side marketplace A(n) _____ enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products initiated by a group of consumers.
Operations Which of the following primary activities in a value chain involves processing raw materials into finished goods and services?
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens. Identify a true statement about in-game mobile marketing.
They are supported by short-range wireless communication technologies. Which of the following is true of mobile commerce (m-commerce) applications?
horizontal A(n) _____ market concentrates on a specific function or business process and automates this function or process for different industries.
Search engine optimization _____ is a method for improving the volume or quality of traffic to a Web site.
business-to-business (B2B) Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks.
E-procurement Identify an application of the seller-side marketplace model that has the main objective of preventing purchases from suppliers that are not on the approved list of sellers.
​infomediary model ​E-commerce sites that use the _____ collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
government-to-government (G2G) Crisis response is categorized as a _____ application.
hit Any element of a Web page that is clicked counts as a _____ to a server.
subscription model In the _____, an organization uses e-commerce sites to sell digital products and services.
The goal of selling products to generate profit is the same. Identify a similarity between e-commerce and traditional commerce.
intrabusiness E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.
ebXML allows you to select only the data requested in a search. In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML).
Brokerage model Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
smart card A _____ is about the size of a credit card and contains an embedded microprocessor chip storing important financial and personal information.
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit. Identify a true statement about cookies.
Technological development Which of the following is a supporting activity in a value chain?
globalization The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain.
Tactical _____ support of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving long-term goals.
MNCs deliver products and services across national borders. Which of the following statements is true of multinational corporations (MNCs)?
data security Transborder data flow (TDF) comprises national laws and international agreements on _____.
The usage on a global scale is more challenging than doing so on a local scale. Which of the following is true of information systems?
Improved telecommunication systems Which of the following factors has made offshore outsourcing attractive for all types of organizations?
noise The _____ factor involves how immune a communication medium is to outside electronic interference.
global information system Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.
integrated A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS).
severe shortage There is a(n) _____ of qualified information systems professionals in the United States and Western Europe.
e-business By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.
transnational An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country.
can increase its control over its subsidiaries An international company with a global information system (GIS) in place _____.
Strategic _____ support of a global information system (GIS) involves broad and long-term goals.
Operational In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities?
Management of global tax risk Which of the following is a strategic requirement for a global information system (GIS)?
production and marketing Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.
synchronous With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.
regionalizing A manufacturer moving operations to another country because of advantages available in that country is involved in _____ the operations.
defined behaviors for different processes Control in a global information system (GIS) requires _____.
standardization within departments The coordination dimension of a global information system (GIS) requires _____.
cheap labor Initially, offshore outsourcing was used mostly in manufacturing to find _____.
switching nodes A global network must have _____ to guide packets to their destinations.
standardization One of the issues with a global information system (GIS) is that too much _____ can decrease an organization’s flexibility in responding to local preferences and even time differences.
coordination In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different specialized parts of an organization.
planning phase During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.
Economic feasibility _____ assesses an information system’s costs and benefits.
It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for the application are not too narrow or one-dimensional in focus. Which of the following is an advantage of a joint application design (JAD)?
Immediate feedback from users Identify a key feature of extreme programming (XP).
A lengthy time frame makes a request for proposal less appealing. Identify a disadvantage of a request for proposal (RFP).
pilot conversion During the implementation phase of the systems development life cycle (SDLC), in _____, the analyst introduces an information system in only a limited area of an organization, such as a division or department.
are its customers, contractors, and suppliers External users of an organization’s information system _____.
System’s quality is improved by addressing major issues that have not been examined before. Identify a true statement of extreme programming.
Both focus on an incremental development process. Identify a similarity between agile methodology and extreme programming (XP).
a narrow focus, which might limit future development One shortcoming of rapid application development (RAD) is _____.
Outsourcing Which of the following increases the risk of leaking confidential information to competitors?
requirements-gathering and analysis phase In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.
physical design During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.
In this, two programmers perform same activities at one workstation. Identify a true statement about pair programming.
Internal users _____ are employees who will use an information system regularly, and they can offer important feedback on the system’s strengths and weaknesses.
The technique works by determining the critical path for interrelated activities with zero slack time. Identify a true statement of the Critical Path Method (CPM).
Management voicing concern about the organization’s lack of a competitive edge in the marketplace Which of the following is an internally identified problem in information systems?
design phase Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
Operational feasibility _____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
flowchart A _____ is a tool used in structured systems analysis and design (SSAD) analysis model that illustrates the logical steps in a process but does not show data elements and associations.
Service-oriented architecture (SOA) _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
Extreme programming (XP) _____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished.
internal rate of return The most common cost-effectiveness analysis methods are payback, net present value (NPV), return on investment (ROI), and _____.
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application. Which of the following is a characteristic of a joint application design (JAD)?
design phase During the _____ of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for an organization.
e-business By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.
integrated A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS).
transnational An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country.
production and marketing Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.
control One of the dimensions along which a global information system (GIS) is defined is _____, which refers to the use of managerial power to ensure adherence to an organization’s goals.
management When designing a successful global information system (GIS), _____ cannot assume a company’s products or services will continue selling the same way because of possible changes in customers’ needs and preferences and global competition.
full-duplex If a company uses multimedia applications in addition to normal file and database sharing, _____ transmission is more efficient.
The Internet _____ can simplify communication, improve business relationships, and offer new opportunities to both consumers and businesses.
globalization The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain.
cheap labor Initially, offshore outsourcing was used mostly in manufacturing to find _____.
It facilitates communication between headquarters and subsidiaries in other countries. Which of the following statements is true of a global information system (GIS)?
synchronous With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.
MNCs deliver products and services across national borders. Which of the following statements is true of multinational corporations (MNCs)?
switching nodes A global network must have _____ to guide packets to their destinations.
Strategic _____ support of a global information system (GIS) involves broad and long-term goals.
can increase its control over its subsidiaries An international company with a global information system (GIS) in place _____.
decentralized Coordination in a global IS requires a(n) _____ architecture for data, standardization within departments, the ability to communicate these standards to other depts, collab systems, & tech that support informal communication & socialization
multinational In a _____ structure, production, sales, and marketing are decentralized and financial management remains the parent company’s responsibility.
defined behaviors for different processes Control in a global information system (GIS) requires _____.
The usage on a global scale is more challenging than doing so on a local scale. Which of the following is true of information systems?
global information system Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.
global One of the issues with the _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.
Operational In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities?
An extensive communication network is necessary to manage a global structure. Which of the following statements is true of a global organization structure?
different character sets used for the names of people and places Designing and implementing a global database is a technical challenge, mainly because of the _____.
system specifications document The _____, which indicates the start of the design phase, is created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC).
Outsourcing Which of the following increases the risk of leaking confidential information to competitors?
physical design During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.
nearshore outsourcing With _____, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico.
maintenance phase During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced.
Operational feasibility _____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it.
conceptual design In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices.
data flow diagram A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.
Rapid application development (RAD) _____ uses an iterative process that repeats the design, expansion, and testing steps as needed, based on feedback from users.
onshore outsourcing With _____, an organization chooses an outsourcing company in the same country.
Immediate feedback from users Identify a key feature of extreme programming (XP).
a narrow focus, which might limit future development One shortcoming of rapid application development (RAD) is _____.
Self-sourcing _____ helps reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs.
Both focus on an incremental development process. Identify a similarity between agile methodology and extreme programming (XP).
planning phase During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem.
A lengthy time frame makes a request for proposal less appealing. Identify a disadvantage of a request for proposal (RFP).
Systems development life cycle (SDLC) develops the entire system at once, whereas extreme programming (XP) uses incremental steps to improve an information system’s quality. Identify a difference between the systems development life cycle (SDLC) and extreme programming (XP).
waterfall model The systems development life cycle (SDLC) is also known as the _____.
proof-of-concept prototype A _____ shows users how a particular task that was not technically feasible can be done.
The technique works by determining the critical path for interrelated activities with zero slack time. Identify a true statement of the Critical Path Method (CPM).
System’s quality is improved by addressing major issues that have not been examined before. Identify a true statement of extreme programming.
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application. Which of the following is a characteristic of a joint application design (JAD)?
planning phase During the _____ of the systems development life cycle (SDLC), analysts investigate a proposed solution’s feasibility and determine how best to present the solution to management to get funding.
Management voicing concern about the organization’s lack of a competitive edge in the marketplace Which of the following is an internally identified problem in information systems?
logical design In the design phase of the systems development life cycle (SDLC), the _____ indicates hardware and software, such as specifying Linux servers and Windows clients.
An e-distributor offers fast delivery of a wide selection of products and services. Which of the following statements is true of an e-distributor?
Distribution centre In manufacturing, identify one of the major links in the supply chain.
unified database The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external data and information needed by other functions.
Personalization In the context of a customer relationship management (CRM) systems, identify a technology used to gather information about customers’ preferences and shopping patterns.
manufacturers In a manufacturing firm’s supply chain, raw materials flow from suppliers to _____.
brokerage An online auction is based on the _____ business model of e-commerce.
Distribution centers In service organizations, what is considered to be one of the major links in the supply chain?
maintenance, repair, and operations In the context of e-marketplaces, a company can purchase a(n) _____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers.
An enterprise system is an application used in all the functions of a business. Identify a true statement about an enterprise system.
Need for extensive training Which of the following is a disadvantage of an enterprise resource planning (ERP) system?
Financial reporting In supply chain management (SCM), identify a process in which electronic data interchange (EDI) accelerates the delivery of accurate information.
E-marketplaces Which of the following helps businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock?
inventory management In the context of an Internet-enabled supply chain management (SCM) system, activities providing real-time stock information and replenishing stock quickly are part of _____.
Traditional EDI is more beneficial when there are more companies in the EDI network. Which of the following statements is true of traditional electronic data interchange (EDI)?
Electronic data interchange In supply chain management (SCM), which of the following is substituted by companies for printing, mailing, and faxing paper documents?
online auction In a supply chain management (SCM) system, typically, an organization hosting an _____ collects transaction fees for the service.
“Web-based” EDI reduces the cost of transmitting documents with the help of the Internet. Identify a true statement about “Web-based” EDI or “Open EDI.”
Knowledge management (KM) Identify a technique that improves customer relationship management (CRM) systems by identifying, storing, and disseminating “know-how.”
Information flow In a manufacturing firm’s supply chain management (SCM) system, which flow oversees order transmission?
Finances flow In a manufacturing firm’s supply chain management (SCM) system, which flow handles credit terms and payment schedules?
purchasing/procurement In the context of Internet-enabled supply chain management (SCM), bargaining and renegotiating prices and term agreements are part of _____ activities.
It improves operational efficiency and manages inventory. Which of the following statements is true of collaborative planning, forecasting, and replenishment (CPFR)?
A data-mining tool In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers’ buying patterns?
It is a cost-effective method for selling excessive inventory. Which of the following statements is true of online auctions?
Customer relationship management Which of the following systems’ goal is to improve services offered to consumers and use consumer contact information for targeted marketing?
Reduction in stress levels Which of the following is an advantage of a group support system (GSS)?
The decision maker’s intuition plays a major role in one-time decisions. Identify a true statement about unstructured decisions.
technical designer In the decision support system (DSS) environment, a _____ focuses on how the DSS is implemented and usually addresses questions about data storage, file structure, user access, response time, and security measures.
Semistructured _____ decisions include a structured aspect that benefits from information retrieval, analytical models, and information systems technology.
semistructured Sales forecasting is an example of a(n) _____ task.
executive information system (EIS) For a(n) _____ to be useful, it should collect data related to an organization’s critical success factors—issues that make or break a business.
Fast response to unexpected situations According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)?
Groupware _____ is a collection of applications that supports decision makers by providing access to a shared environment and information.
Points Which of the following geographic objects of a geographic information system (GIS) is most likely used to show the location of an airport?
Intelligent agents _____ are programs that carry out repetitive tasks and can be programmed to make decisions based on specified conditions.
unstructured Research and development is an example of a(n) _____ decision.
unstructured Resolving conflicts between two divisions is a type of _____ decision at the tactical management level.
Budget preparation In which of the following areas is a semistructured decision often used?
spatial data A GIS with analytical capabilities evaluates the impact of decisions by interpreting _____.
Spotting trends Which of the following tasks performed by managers uses an executive information system (EIS)?
Unnecessary meetings Identify a disadvantage of group support systems (GSSs)?
intelligence phase In the _____ of the decision-making process, data is collected from internal and external sources and processed.
unstructured Setting queue priorities is a type of _____ decision at the operational management level.
Government _____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations.
Find zip codes of areas with high population Identify a task performed by a geographic information system (GIS).
Electronic meeting systems _____ enable decision makers in different locations to participate in a group decision-making process.
Introducing a new product In which of the following areas is an unstructured decision often used?
Structured _____ decisions can be automated because a well-defined standard operating procedure exists for these types of decisions.
geographic information system (GIS) A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states).
Desktop conferencing enables participants to have multiple video windows open at one time. Identify a characteristic of electronic meeting systems.
DENDRAL _____ was the first expert system developed to determine the chemical structure of molecules.
expert system Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
Inference engine Which component of an expert system uses forward and backward chaining to manipulate a series of rules?
Monitoring and surveillance _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.
`Shopping and information _____ agents can serve as search engines, site reminders, or personal surfing assistants.
It adds the capability to handle fuzzy data. Which of the following is true of integrating an expert system into the database component of a DSS?
knowledge acquisition facility In the context of an expert system, a(n) _____ works with the knowledge base management system to ensure that the knowledge base is as up to date as possible.
Meta-knowledge _____ is the knowledge base component of an expert system and enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution.
heuristics In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.
if In forward chaining technique used by the inference engine component of an expert system, the _____ condition is evaluated first.
Autonomy Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input.
personal A(n) _____ agent can be used to automatically fill out Web forms.
inference engine In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system (DSS).
case-based Hewlett-Packard uses _____ reasoning to assist users of its printers.
retain The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.
artificial neural network Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
Natural-language processing _____ was developed so that users could communicate with computers in human language.
mobility The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention.
bots Intelligent agents are also known as _____.
PortBlue _____ is an example of an expert system that can be applied to various financial applications.
Genetic algorithms _____ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems.
DSS (Decision Support System) Adding deductive reasoning to traditional DBMS functions is a benefit of integrating an expert system into the database component of a(n) _____.
Fuzzy logic _____ is designed to help computers simulate vagueness and uncertainty in common situations.
Expert _____ systems have been one of the most successful artificial intelligence (AI)-related technologies.
They have limited mobility. Which of the following statements is true of personal robots?
hybrid A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
Software as a service In the context of application software providers (ASPs), which of the following is also known as “on-demand software”?
Central coordinating processor and software system Identify a component of a virtual reality (VR) system that generates and manipulates high-quality graphics.
Biometric _____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing.
virtual world A(n) _____ is a simulated environment designed for users to interact via avatars.
Passive _____ radio frequency identification (RFID) tags have no internal power supply.
private In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
Web browsers Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
Private cloud GuardIT,security company, work w companies2obtain intel property&protect em.deals w secure data4variety of software&e-commerce agreements,TM&patent licenses.cloud comput optn wld b most suitable?
cave automatic virtual environment (CAVE) A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines.
nanoscale Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____.
Regulatory compliance _____ is a cloud-computing risk that deals with the availability of external audits and security certifications.
Cloud computing _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0.
Data segregation _____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
community Allocation of cost and responsibilities, governance, and the implementation of a tight security system are the major obstacles while using a _____ cloud computing option.
scanner In order to read a QR (quick response) code using a smartphone, one must have the _____ app.
Active _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
Infrastructure as a service (IaaS) VT offer cloud comput serv to several data centers in the world.provide comp infrastructure - servers, networking elements, and SaaS.own the equipment&are liable for housing,functioning,&maintaining it.type of cloud comput model VT delivers as a service?
networked communication In the context of virtual reality (VR), _____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds.
Platform as a service (PaaS) _____ automates the configuration, deployment, and ongoing management of applications in the cloud.
push With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.
hardware as a service (HaaS) According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.
Biometrics _____ could be useful for authentication purposes in voting via the Internet.
metropolitan area networks Worldwide Interoperability for Microwave Access (WiMAX) is designed for wireless _____.
push Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees’ workstations.
knowledge In the artificial intelligence (AI) field, _____ engineers try to discover “rules of thumb” that enable computers to perform tasks usually handled by humans.
Monitoring and surveillance _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.
Artificial neural _____ networks are networks that learn and are capable of performing tasks that are difficult with conventional computers.
heuristic knowledge The knowledge base component of an expert system must include _____, which consists of rules related to a problem or discipline.
case-based Hewlett-Packard uses _____ reasoning to assist users of its printers.
Autonomy Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input.
then In backward chaining technique used by the inference engine component, an expert system starts with the _____ condition.
Natural-language processing _____ was developed so that users could communicate with computers in human language.
Variable Assembly Language (VAL) _____ is a programming language for controlling robots.
heuristics In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.
bots Intelligent agents are also known as _____.
They have limited mobility. Which of the following statements is true of personal robots?
Inference engine Which component of an expert system uses forward and backward chaining to manipulate a series of rules?
expert system Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
case-based In design and implementation of any _____ reasoning application there are 4 Rs involved.
expert systems In the context of integrating artificial intelligence technologies into a decision support system’s model base component, _____ can be added to include heuristics in the model base’s analysis capabilities.
Humanlike interface Identify the characteristic of a sophisticated intelligent agent that demonstrates its capability to interact with users in a more natural language.
retain The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.
knowledge acquisition facility In the context of an expert system, a(n) _____ works with the knowledge base management system to ensure that the knowledge base is as up to date as possible.
robots _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
artificial neural network Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
artificial neural network Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____
data warehouse Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.
what-if In the context of the decision-making analyses that use information technology, _____ analysis is available in spreadsheet programs such as Microsoft Excel.
databases An NLP system provides a question-and-answer setting that is particularly useful with _____.
Expert _____ systems have been one of the most successful artificial intelligence (AI)-related technologies.
biometrics _____ could be useful for authentication purposes in voting via the Internet.
Nanomaterials Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?
personal area network (PAN) Bluetooth can be used to create a _____, to communicate among computerized devices.
Web browsers Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
interaction _____ means enabling users to act on objects in a virtual reality (VR) environment, such as using a data glove to pick up and move objects.
it does not guarantee that an application will fully meet an organization’s needs One of the major disadvantages of an application service provider (ASP) is that _____.
scanning tunneling microscope (STM) The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
push Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees’ workstations.
scanner In order to read a QR (quick response) code using a smartphone, one must have the _____ app.
hybrid A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.
radio frequency identification tag A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes.
quick response code A _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background.
active _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
hardware as a service (HaaS) According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.
telepresence In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location.
software as a service (SaaS) With the _____ model, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software.
public _____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web.
Biometric _____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing.
cloud computing _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0.
metropolitan area networks Worldwide Interoperability for Microwave Access (WiMAX) is designed for wireless _____.
public cloud computing WPis in the process of shifting its list of inven2cloud4easier access among its diff branches.company trying to find a cloud comput optn that offers highest cost saving&requires least amt of involv by IT mngrs.Wich cloud computing optn wld b the best4WP?
push With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.
data segregation _____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud.
ASPs ensure that software is kept up to date, based on users’ requests. Which of the following is an advantage of application service providers (ASPs)?
Created by: pace_sauce
Popular Business sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards