Term
click below
click below
Term
Normal Size Small Size show me how
CIS Exam 1
Term | Definition |
---|---|
focus | Which of the following strategies was identified by Michael Porter to successfully compete in the marketplace? |
analyzed facts | Identify the output of an information system. |
providing information in a useful format for decision-making purposes | The final task in designing a management information system (MIS) is _____. |
supplier | In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options. |
differentiation strategy | Which of the following strategies is identified by Michael Porter for successfully competing in the marketplace? |
database administrator (DBA) | In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation. |
they focus on data collection and processing | Identify the true statement about transaction-processing systems |
information | Identify the component of an information system that consists of facts analyzed by the process component. |
data | The _________ component of an information system is considered the input to the system. |
it allocates human and financial resources | Identify a true statement about personnel information system (PIS). |
selecting the best modes of transportation | Which of the following decisions is supported by a logistics information system (LIS)? |
differentiation strategy | Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors? |
timeliness | To be useful, information must have the quality of _____. |
providing an inexpensive medium for targeting a large customer base | Social networking sites can reduce organizations’ costs by _____. |
they are flexible and easy to use | Why do information systems use graphical user interfaces (GUIs)? |
marketing information systems (MKIS) | What system is used for forecasting sales? |
threat of new entrants | Which of the following is one of the forces of the Five Forces Model identified by Michael Porter? |
It is a network within an organization that uses Internet protocols and technologies. | Identify the true statement about intranets |
It focuses on generating new revenue by offering new products and services. | In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy. |
it is considered to be the input for an information system | Identify the true statement about the data component of an information system. |
labor statistics | _____ is an external data source of an information system. |
produce information in different formats | To be useful, information systems should _____ |
database administrator | In the context of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools. |
business intelligence | Identify the term that provides historical and predictive views of business operations. |
computer literacy | _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software. |
serial port | A(n) _____ is a communication interface through which information is transferred one bit at a time. |
parallel port | A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. |
silicon cannot emit light and has speed limitations | Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide. |
kernel | The supervisor program in an operating system (OS) is called the _____. |
The contents of programmable read-only memory cannot be reprogrammed. | identify a true statement about memory devices. |
byte | A _____ is the size of a character. |
remote access servers | An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources? |
computer-aided design | _____ software is used for drafting and has replaced traditional tools, such as T-squares, triangles, paper, and pencils. |
random access memory (RAM) | The Clipboard’s contents are typically stored in _____. |
bus | A _____ is a link between devices connected to a computer. |
assembly language | Identify a computer language that is machine dependent. |
cloud | _____ storage, which is used for online storage and backup, involves multiple virtual servers that are usually hosted by third parties. |
microsoft windows | Which of the following is the OS for most PCs and belongs to the system software group? |
third-generation | _____ computer languages are machine independent and are called high-level languages. |
disk drive | A _____ is a peripheral device for recording, storing, and retrieving information. |
An inkjet printer uses multicolored ink cartridges to print digital photographs. | Which of the following statements is true of inkjet printers? |
128 | An ASCII file defines up to _____ characters. |
storage | _____ means saving data in computer memory. |
high-level | Java and C++ are _____ languages. |
Laser printers use toners to create high-quality output. | Identify a true statement about laser printers. |
liquid crystal display | A(n) _____ is a common output device for soft copy. |
256 | Extended ASCII data code allows representation of _____ characters. |
redundant array of independent disks | Extended ASCII data code allows representation of _____ characters. |
remote data entry | Third-generation computers introduced _____. |
It is a set of programs for controlling and managing computer hardware and software | Which of the following best defines an operating system? |
it focuses on improving efficiency by reducing overall costs | In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy. |
It helps the organization reduce cost of products and services. | Identify how information systems help an organization. |
It focuses on generating new revenue by offering new products and services. | In the context of using information technology for a competitive advantage, identify a true statement about top-line strategy. |
buyer power | _____ is high when customers have many choices and low when they have few choices. |
chief technology officer | The top information systems job belongs to the _________. |
information literacy | Identify the term used for understanding the role of information in generating and using business intelligence. |
commercial programs | Identify the software components of a management information system (MIS). |
They are used to create, organize, and manage databases. | Identify a true statement about database management systems. |
Aggregated data enables decision makers to focus on specific factors. | Which of the following statements is true about data? |
network administrator | In the context of information technology (IT) jobs, in the information systems field, a _________ is typically responsible for providing network and cybersecurity. |
data | The _________ component of an information system is considered the input to the system. |
social networking sites | _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies. |
supplier | In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options. |
computer literacy | _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software. |
information | Identify the component of an information system that consists of facts analyzed by the process component. |
process | The purpose of an information system’s _____ component is generating the most useful type of information for making decisions. |
context aware computing | Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as _____. |
selecting the best modes of transportation | Which of the following decisions is supported by a logistics information system (LIS)? |
database management system | Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____. |
business intelligence | Identify the term that provides historical and predictive views of business operations. |
operating system | UNIX is a type of _____. |
data codes | Computers and communication systems use _____ to represent and transfer information between computers and network systems. |
mouse | A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning. |
secondary memory | _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods. |
third-generation | _____ computer languages are machine independent and are called high-level languages. |
program | A(n) _____ is a step-by-step direction for performing a specific task, which is written in a language the computer can understand. |
random access memory (RAM) | Which of the following memory devices allows data to be read and written? |
The contents of programmable read-only memory cannot be reprogrammed. | identify a true statement about memory devices |
optical mark recognition (OMR) system | Identify an input device used to grade multiple-choice and true/false tests. |
ROM is nonvolatile memory, whereas RAM is volatile memory. | How is read-only memory (ROM) different from random access memory (RAM)? |
8 | The word computer consists of 64 bits, which is equivalent to _____ bytes. |
binary number | Every character, number, or symbol on the keyboard is represented as a _____ in computer memory. |
optical storage | A write once, read many (WORM) disc is a common type of _____. |
American Standard Code for Information Interchange | Identify the file in which each alphabetic, numeric, or special character is represented with a 7-bit binary number. |
vacuum tube technology | Beginning in the 1940s, first-generation computers used _____ |
remote data entry | Third-generation computers introduced _____. |
redundant array of independent disks | A _____ allows data to be stored in multiple places to improve a system’s reliability. |
occupy less space than a mouse | Trackballs are ideal for notebook computers because they _____. |
database engine | The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval. |
it uses more sophisticated security measures | Identify an advantage of using a database over a flat file system. |
external and internal | The database component of an information system can generate sufficient business intelligence by accessing the _____ data of an organization. |
indexed sequential access method | Identify a file structure that is similar to a book index that lists page numbers where certain topics can be found. |
raw data | In data warehouses, _____ is information in its original form. |
AND | The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met |
store multidimensional data | Data warehouses are sometimes called “hypercubes” because they _____. |
warehouse | A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. |
data mining tools | Business analytics uses _____ to support decision-making activities. |
project | In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. |
data mart | A _____ is usually a smaller version of a data warehouse, used by a single department or function. |
create, read, update, and delete | In the context of data administration component, the acronym CRUD stands for _____. |
mobile and wireless technology | Which of the following is a key factor that has contributed to the growth and popularity of big data? |
attributes | In a relational database model, the columns are known as _____. |
operations | Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data? |
enterprise resource planning systems | Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports? |
logical structure | To begin designing a relational database, one must define the _____ by defining each table and the fields in it. |
developing recovery procedures in case data is lost or corrupted | A database administrator is responsible for _____. |
allocation | The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication. |
integrity rules | _____, a component of a data model, defines the boundaries of a database, such as maximum and minimum values allowed for a field. |
summary data | In data warehouses, _____ gives users subtotals of various categories, which can be useful. |
select | In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria. |
metadata | In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics. |
administration | The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. |
data definition | The _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. |
Web server | Whenever a user accesses the same domain, the browser sends saved information to the _________. |
They let independent customers share skills and have access to each other’s markets via information technologies. | Which of the following is true about virtual organizations? |
nonrepudiation | In the context of Web and network privacy, _____ is a method for binding all the parties to a contract. |
cybersquatting | _____ is registering, selling, or using a domain name to profit from someone else’s trademark. |
accountability | In the context of Web and network privacy, _____ refers to issues involving both the user’s and the organization’s responsibilities and liabilities. |
trademark | A _________ is an intellectual property that protects product names and identifying marks. |
industrial | In the context of intellectual properties, inventions are categorized as _________ properties. |
spam | In the context of privacy issues, unsolicited e-mail sent for advertising purposes is called _________. |
Copyright Act | The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs. |
Copyrights’ length vary based on the type of work. | Identify a true statement about copyrights. |
Communications Decency Act | The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment. |
reduces employee turnover | A potential benefit of telecommuting is that it _____. |
cookies | Which of the following is a commonly used technology for data collection? |
By using video conferencing, electronic meeting systems, and groupware | In which of the following ways can green computing be achieved? |
digital divide | Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____. |
Organizations can use patents to keep competitors from entering certain market segments. | Which of the following is a benefit of using patents in organizations? |
URL hijacking | _________ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser. |
copyright | _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission. |
The speed of the Internet connection also plays a role in digital divide discussion. | Identify a true statement about information technology in social divisions. |
legal and ethical | A software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When his manager, discovers that he had intentionally spread the virus, he immediately fires Alfred. The manager's behavior is considered |
upgrading | In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____. |
Companies respond to customers faster and more efficiently. | Which of the following statements is true of virtual organizations? |
when experienced labor is eliminated by high technology | In the context of information technology in workplaces, when does job deskilling occur? |
skills are shared among participating companies of a virtual organization | In the context of virtual organizations, the cost of hiring additional employees is reduced because _____. |
green computing | _________ is computing that promotes a sustainable environment and consumes the least amount of energy. |
social engineering | In the context of security threats, _________ means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. |
signature analysis | Which of the following is a biometric security measure? |
pharming | Similar to phishing, _____ is directing Internet users to fraudulent Web sites with the intention of stealing their personal information, such as Social Security numbers, passwords, bank account numbers, and credit card numbers. |
secure sockets layer | _____ is a commonly used encryption protocol that manages transmission security on the Internet. |
front-end servers | A level 1 security system is used to protect _____ against unauthorized access. |
computer fraud | _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account. |
Trojan programs | In the context of intentional threats, _____ can erase data and wreak havoc on computers and networks, but they do not replicate themselves. |
back-end systems | To ensure confidentiality, accuracy, and integrity of data, a level 2 security system protects _____. |
firewall | A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks. |
sniffing | _____ is the process of capturing and recording network traffic. |
phishing | _________ is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university. |
proxy server | In nonbiometric security measure, a _____ is a software that acts as an intermediary between two systems. |
firewalls | Which of the following is a nonbiometric security measure? |
symmetric | _____ encryption is also known as secret key encryption. |
It occurs when an illegitimate program poses as a legitimate one. | when does spoofing occur? |
Firewalls protect against external access and not from internal intrusions. | identify a true statement about firewalls |
biometric security measure | Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others. |
intrusion detection systems | _____ are usually placed in front of a firewall and can identify attack signatures and trace patterns. |
business continuity planning | _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion. |
fault-tolerant systems | When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure. |
It is an independent program that can spread itself without attaching itself to a host program. | Which of the following is true of a worm? |
confidentiality | In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it. |
It involves sending fraudulent e-mails that seem to come from legitimate sources. | Which of the following is true of phishing? |
spyware | _________ is software that secretly gathers information about users while they browse the Web. |
worm | A _____ travels from computer to computer in a network but it does not usually erase data. |
broadband | In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate. |
time division multiple access (TDMA) | In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots. |
radiated | Communication media that use an antenna for transmitting data through air or water are called _________ media. |
hierarchical topology | Identify a topology used by traditional mainframe networks. |
ethernet | A(n) _____ cable is used to connect computers, hubs, switches, and routers to a network |
radiated media | Transmission of data across satellites is through _____. |
ring topology | In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network. |
digital subscriber line (DSL) | _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data. |
protocol | _________ is a set of rules that govern data communication, including error detection, message length, and transmission speed. |
integrate services to a single building or campus | Local area networks (LANs) are used to _____. |
It requires major network upgrades, because video requires much more bandwidth. | Identify a true statement about convergence in data communication. |
network layer | Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates. |
speed of its interconnections | The data transfer speed of a wide area network (WAN) depends on the _____. |
bandwidth | The amount of data that can be transferred from one point to another in one second is called _____. |
fiber-optic | _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables. |
nodes on a network | A routing table lists _____. |
Asynchronous Transfer Mode (ATM) | In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps. |
transport layer | Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data. |
multiplexer | A _____ is a hardware device that allows several nodes to share one communication channel. |
WPA (Wi-Fi Protected Access) | _________ is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques. |
tree | A hierarchical topology is also called a _____ topology. |
adding more workstations | Horizontal scaling of client/server architecture means _____. |
An n-tier architecture helps improve network performance | Identify a true statement about the types of client/server architecture. |
it handles steady traffic well | Identify an advantage of the bus topology. |
internet protocol (IP) | _____ is responsible for packet forwarding. |
Assymetric DSL (ADSL) | _____ has a lower transmission rate upstream than downstream. |
/˜hbidgoli | In the URL _____ represents the name of the directory in which files are stored. |
XML tags represent the kind of content being posted and transmitted. | Which of the following statements is true of Extensible Markup Language (XML)? |
hyphens | Which of the following can be used in domain names in uniform resource locators (URLs)? |
gigapop | A _________ is a local connection point-of-presence that connects a variety of high-performance networks, and its main function is the exchange of Internet2 (I2) traffic with a specified bandwidth. |
IP addresses | DNS (Domain Name System) servers translate all domain names into _____. |
directories | _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for. |
Web 3.0 | The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs. |
server | Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a _____. |
Intranets help move from calendar-based document-publishing strategy to one that is based on needs. | In the context of an organization, which of the following statements is true of an intranet? |
Geographic TLDs are used to promote business and tourism. | Which of the following statements is true of geographic top-level domains (TLDs)? |
crawlers | _____, a software used by search engines, can go through the other pages that are part of a Web site, as long as there are links to those pages. |
blog | A _____ is a journal or newsletter that is updated frequently and intended for the general public. |
With VoIP, users can have calls forwarded from anywhere in the world. | Identify a true statement about Voice over Internet Protocol (VoIP). |
uniform resource locator (URL) | A(n) _____ is the address of a document or site on the Internet. |
hypermedia | The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents. |
voice over internet protocol (VOIP) | _________ is the protocol used for Internet telephony |
client-based | Microsoft Outlook is an example of a _____ e-mail program. |
SMTP | Which of the following protocols is used to send e-mails? |
podcast | Syndication feeds are one way of announcing the availability of a _____. |
domain names | _____ are unique identifiers of computer or network addresses on the Internet. |
The call quality is not as good as it is with regular phone lines | Which of the following is a drawback of Internet telephony? |
instant messaging (IM) | _________ is an Internet service for communicating with others via a private “chat room” on the Internet. |
teleimmersion system | A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web. |
Web 3.0 | Which of the following is also known as “the Semantic Web”? |
They focus on data collection and processing. | Identify the true statement about transaction-processing systems. |
Analysis of price changes and discounts | Which of the following decisions is supported by a manufacturing information system (MFIS)? |
timeliness | To be useful, information must have the quality of _____. |
It helps the organization reduce cost of products and services. | Identify how information systems help an organization. |
webmaster | In the context of the information technology (IT) jobs, in the information systems field, a _________ designs and maintains the organization’s Web site. |
Information literacy | Identify the term used for understanding the role of information in generating and using business intelligence. |
computer literacy | _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software. |
know how and why data is collected | To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____. |
They are flexible and easy to use. | Why do information systems use graphical user interfaces (GUIs)? |
pervasive analytics | Building and integrating analytics capabilities into all everyday business activities is known as _____. |
They can automate repetitive operations. | Which of the following statements is true of transaction-processing systems? |
analyzed facts | Identify the output of an information system. |
supplier | In accordance with Porter’s Five Forces Model, _____ power is high when customers have fewer options |
information | Identify the component of an information system that consists of facts analyzed by the process component. |
Differentiation strategy | Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors? |
computer literacy | _________ means having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. |
Aggregated data enables decision makers to focus on specific factors. | Which of the following statements is true of data? |
short-message service | Twitter is an example of _________. |
produce information in different formats | To be useful, information systems should _____. |
Determining portfolio structures | Which of the following decisions is supported by a financial information system (FIS)? |
database administrator (DBA) | In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation. |
Social networking sites | _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies. |
chief technology officer | The top information systems job belongs to the _________. |
It focuses on improving efficiency by reducing overall costs. | In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy. |
_____ is a social networking Web site. | |
Remote access servers | An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources? |
optical storage | A write once, read many (WORM) disc is a common type of _____. |
byte | A _____ is the size of a character |
occupy less space than a mouse | Trackballs are ideal for notebook computers because they _____. |
Laser printers use toners to create high-quality output. | Identify a true statement about laser printers. |
The contents of programmable read-only memory cannot be reprogrammed. | Identify a true statement about memory devices. |
redundant array of independent disks | A _____ allows data to be stored in multiple places to improve a system’s reliability. |
random access memory (RAM) | Which of the following memory devices allows data to be read and written? |
liquid crystal display | A(n) _____ is a common output device for soft copy. |
ROM is nonvolatile memory, whereas RAM is volatile memory. | How is read-only memory (ROM) different from random access memory (RAM)? |
Silicon cannot emit light and has speed limitations. | Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide. |
8 | The word computer consists of 64 bits, which is equivalent to _____ bytes. |
parallel port | A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously. |
An inkjet printer uses multicolored ink cartridges to print digital photographs. | Which of the following statements is true of inkjet printers? |
it is less fragile than gallium arsenide | An advantage of silicon over gallium arsenide is that _____. |
Third-generation | _____ computer languages are machine independent and are called high-level languages. |
It is a set of programs for controlling and managing computer hardware and software. | Which of the following best defines an operating system? |
Microsoft Windows | Which of the following is the OS for most PCs and belongs to the system software group? |
It controls all the programs in the OS to perform special tasks. | Identify a true statement about the supervisor program. |
Assembly language | Identify a computer language that is machine dependent. |
mouse | A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning. |
secondary memory | _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods. |
vacuum tube technology | Beginning in the 1940s, first-generation computers used _____. |
kernel | The supervisor program in an operating system (OS) is called the _____. |
random access memory (RAM) | The Clipboard’s contents are typically stored in _____. |
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. | Which of the following statements is true of data marts and data warehouses? |
Sales records | In a database, which of the following is a source of internal data? |
Mobile and wireless technology | Which of the following is a key factor that has contributed to the growth and popularity of big data? |
Enterprise resource planning systems | Which of the following data sources provides the input a data warehouse needs to perform analyses and generate reports? |
structured data and unstructured data | The variety dimension of big data refers to a combination of _____. |
Significant improvements in storage technology | Which of the following factors has made big data analytics accessible to nearly all types of organizations? |
Only one | Identify the number of physical views of data for a database. |
attributes | In a relational database model, the columns are known as _____. |
focuses on a specific area | In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____. |
distributed database | A(n) _____ is not limited by the data’s physical location. |
warehouse | A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. |
store multidimensional data | Data warehouses are sometimes called “hypercubes” because they _____. |
AND | The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met. |
allocation | The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication. |
Tax records | Which of the following is an example of a source for external data? |
foreign | In a relational database model, when a primary key for one table appears in another table, it is called a _____ key. |
hierarchical | In a(n) _____ model, nodes with the same parents are called siblings. |
extraction | In a data warehouse, _____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing. |
data model | The first step in database design is defining a _____, which defines how data is created, represented, organized, and maintained. |
database engine | The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval. |
data dictionary | The _____ stores definitions, such as data types for fields, default values, and validation rules for data in each field. |
logical structure | To begin designing a relational database, one must define the _____ by defining each table and the fields in it. |
metadata | In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics. |
Data in a flat file system may not be updated in all files consistently. | Identify a true statement about a flat file system. |
It is a result of exponential growth of data in both public and private organizations. | Which of the following statements is true of big data? |
CyberSitter | Identify a program used by parents to prevent their children’s access to certain Web sites. |
public | _____ information can be censored if the content is deemed offensive to a political, religious, or cultural group. |
smart | In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ cards are being developed. |
The speed of the Internet connection also plays a role in digital divide discussion. | Identify a true statement about information technology in social divisions |
patent | A _________ is an intellectual property that protects new processes. |
typosquatting | When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____. |
Products are customized more to respond to customers’ needs. | In the context of information technology in workplaces, which of the following is an advantage of virtual organizations? |
By using video conferencing, electronic meeting systems, and groupware | In which of the following ways can green computing be achieved? |
Green computing | _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment. |
acceptable use policy | In the context of privacy issues, in an organization, a new employees have to sign a(n) _________ before they access the network. |
Copyrights’ length vary based on the type of work. | Identify a true statement about copyrights. |
Copyright | _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission. |
They let independent customers share skills and have access to each other’s markets via information technologies. | Which of the following is true about virtual organizations? |
legal but unethical | A credit card company sells its customers’ mailing addresses to its competitors. In this scenario, the company’s action is considered _____. |
Spamming | _____ can rise to an unmanageable level quickly, clogging users’ in-boxes and preventing access to legitimate e-mails. |
Net neutrality | Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally? |
upgrading | In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____. |
skills are shared among participating companies of a virtual organization | In the context of virtual organizations, the cost of hiring additional employees is reduced because _____. |
Copyright Act | The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs. |
digital divide | Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____. |
use verification procedures to ensure data accuracy | To minimize the invasion of privacy, users and organizations should _____. |
Cybersquatting | _____ is registering, selling, or using a domain name to profit from someone else’s trademark. |
Web server | Whenever a user accesses the same domain, the browser sends saved information to the _________. |
Communications Decency Act | The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment. |
Organizations can use patents to keep competitors from entering certain market segments | Which of the following is a benefit of using patents in organizations? AND |
AND | The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met. |
sequential access file structure | The _____ method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis. |
database engine | The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval. |
warehouse | A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence. |
Tax records | Which of the following is an example of a source for external data? |
hierarchical | In a(n) _____ model, nodes with the same parents are called siblings. |
tuples | In a relational database model, the rows are known as _____. |
Operations | Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data? |
data manipulation | The _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database. |
Indexed sequential access method | Identify a file structure that is similar to a book index that lists page numbers where certain topics can be found. |
data mining tools | Business analytics uses _____ to support decision-making activities. |
structured data and unstructured data | The variety dimension of big data refers to a combination of _____. |
foreign | In a relational database model, when a primary key for one table appears in another table, it is called a _____ key. |
network | In a(n) _____ model, each record can have multiple parent and child records. |
create, read, update, and delete | In the context of data administration component, the acronym CRUD stands for _____. |
It uses more sophisticated security measures. | Identify an advantage of using a database over a flat file system. |
focuses on a specific area | In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____. |
raw data | In data warehouses, _____ is information in its original form |
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. | Which of the following statements is true of data marts and data warehouses? |
store multidimensional data | Data warehouses are sometimes called “hypercubes” because they _____. |
project | In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. |
Only one | Identify the number of physical views of data for a database. |
select | In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria. |
administration | The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management. |
summary data | In data warehouses, _____ gives users subtotals of various categories, which can be useful. |
reduces employee turnover | A potential benefit of telecommuting is that it _____. |
Copyrights’ length vary based on the type of work. | Identify a true statement about copyrights. |
Companies respond to customers faster and more efficiently. | Which of the following statements is true of virtual organizations? |
Cybersquatting | _____ is registering, selling, or using a domain name to profit from someone else’s trademark. |
Log files | _____, which are generated by Web server software, record a user’s actions on a Web site |
skills are shared among participating companies of a virtual organization | In the context of virtual organizations, the cost of hiring additional employees is reduced because _____. |
cookies | Which of the following is a commonly used technology for data collection? |
Lack of necessary supplies or equipment | Which of the following is a potential drawback of telecommuting? |
not charge different rates on data | According to the principle of Internet neutrality, Internet service providers (ISPs) and government agencies should _____. |
CyberSitter | Identify a program used by parents to prevent their children’s access to certain Web sites. |
The speed of the Internet connection also plays a role in digital divide discussion | Identify a true statement about information technology in social divisions. |
legal but unethical | Clement applies for a home loan at a bank. As part of the process, he provides his personal details to the bank. The banker uses Clement’s personal information to sell him insurance policies. In this scenario, the banker’s action is considered _____ |
trademark | A _________ is an intellectual property that protects product names and identifying marks. |
reliability | To minimize the invasion of privacy, any organization creating, maintaining, using, or disseminating records of personal data must ensure the data’s _____. |
illegal and unethical | Jared makes two copies of an antivirus software package he just bought and gives one of the copies to Joshua. In this scenario, Jared’s actions are considered _____. |
censorship | In the context of ethical issues of information technologies, restricting access to the Web is a type of _____. |
copyrights | In general, _____ last the author’s lifetime plus 70 years. |
Green computing | _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment. |
They let independent customers share skills and have access to each other’s markets via information technologies | Which of the following is true about virtual organizations? |
cookies | _____ provide information about a user’s location and computer equipment, and this information can be used for unauthorized purposes, such as corporate espionage. |
virtual | _________ organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets. |
trademarks | In the context of intellectual property, which of the following is categorized as industrial property? |
social security numbers | A common way to index and link databases is by using _________. |
needed for the stated purpose | To minimize the invasion of privacy, organizations should keep collected information only as long as it is _____. ` |
Copyright Act | The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs. |
Firewalls protect against external access and not from internal intrusions. | Identify a true statement about firewalls. |
Computer fraud | _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account. |
Spyware is software that secretly gathers information about users while they browse the Web. | What is Spyware? |
Passwords | Which of the following is a type of access control used to protect systems from unauthorized access? |
backdoor | In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer. |
Asymmetric | _____ encryption usually works better for public networks, such as the Internet. |
blended | A _________ threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. |
Signature analysis | Which of the following is a biometric security measure? |
corporate networks | A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access. |
integrity | In the context of computer and network security, _____ refers to the accuracy of information resources within an organization. |
Ciphertext | Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key? |
blended threat | In the context of security threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. |
Sabotage | _____ is a computer crime that involves destroying or disrupting computer services. |
social engineering | In the context of security threats, _____ takes advantage of the human element of security systems. |
availability | In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need. |
Asymmetric | _____ encryption uses a public key known to everyone and a private key known only to the recipient. |
front-end servers | A level 1 security system is used to protect _____ against unauthorized access. |
Secure Sockets Layer | In data encryption, the indicates a safe HTTP connection over _____. |
denial-of-service attack | In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system. |
Physical | _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft. |
It involves sending fraudulent e-mails that seem to come from legitimate sources. | Which of the following is true of phishing? |
firewall | A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks. |
It occurs when an illegitimate program poses as a legitimate one. | When does spoofing occur? |
symmetric | In _____ encryption, the same key is used to encrypt and decrypt a message. |
Adware | _________ is a form of spyware that collects information about a user (without the user’s consent) to determine which advertisements to display in the user’s Web browser. |
speed of its interconnections | The data transfer speed of a wide area network (WAN) depends on the _____. |
decentralized | In _____ processing, each department has its own computer for performing processing tasks. |
centralized | A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers. |
Digital subscriber line (DSL) | _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data. |
Asynchronous Transfer Mode (ATM) | In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps. |
Coaxial cables | _____ are conducted media, which can be used for both data and voice transmissions. |
It ensures a tight control over system operations and applications. | Identify an advantage of centralized processing. |
Network layer | Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates. |
WPA2 (Wi-Fi Protected Access 2) | A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key? |
transport | The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. |
adapter card | Computers in a local area network (LAN) are usually connected to the network via a(n) _____, which is a hardware component. |
It handles steady traffic well. | Identify an advantage of the bus topology. |
mobile | A _____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter. |
broadband | In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate. |
It requires major network upgrades, because video requires much more bandwidth. | Identify a true statement about convergence in data communication. |
hierarchical topology | A _________ works well for companies that are geographically dispersed. |
conducted | In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. |
The user creates a query by running client software. | Which of the following events takes place in the most basic client/server configuration? |
Fiber-optic | _____ cables have the highest bandwidth of any communication medium. |
WPA (Wi-Fi Protected Access) | _________ is a technique to improve the security of wireless networks, which combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques. |
Fiber-optic | _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables. |
RF spectrum | Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _________ as the communication medium. |
Open Systems Interconnection (OSI) | The _________ model is a seven-layer architecture for defining how data is transmitted from computer to computer in a network. |
radiated media | Transmission of data across satellites is through _____. |
routing | The process of deciding which path data takes on a network is called _____. |
denial-of-service attack | In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system. |
corporate networks | A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access. |
Backdoors | Which of the following is considered an intentional security threat? |
It involves sending fraudulent e-mails that seem to come from legitimate sources | Which of the following is true of phishing |
blended threat | In the context of security threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. |
Ciphertext | Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key? |
When programs suddenly increase in size | Which of the following indicates that a computer might be affected by a virus? |
Passwords | Which of the following is a type of access control used to protect systems from unauthorized access? |
Sabotage | _____ is a computer crime that involves destroying or disrupting computer services. |
symmetric | In _____ encryption, the same key is used to encrypt and decrypt a message. |
Firewalls protect against external access and not from internal intrusions. | Identify a true statement about firewalls. |
worm | A _____ travels from computer to computer in a network but it does not usually erase data. |
Computer fraud | _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account. |
Spyware | _____ can interfere with users’ control of their computers, through such methods as installing additional software and redirecting Web browsers. |
front-end servers | A level 1 security system is used to protect _____ against unauthorized access. |
backdoor | In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer. |
Physical | _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft. |
fault-tolerant systems | When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure. |
It is an independent program that can spread itself without attaching itself to a host program. | Which of the following is true of a worm? |
provide information on security incidents | The main function of Cyber Incident Response Capability (CIRC) is to _____. |
virtual private network | A(n) _____ is often used so remote users have a secure connection to an organization’s network. |
social engineering | In the context of security threats, _____ takes advantage of the human element of security systems. |
McCumber cube | The Committee on National Security Systems (CNSS) proposed another model for evaluating information security known as the _____. |
Logic bomb | Identify an intentional security threat that is a type of Trojan program used to release a virus, worm, or other destructive code. |
Symmetric | _____ encryption is also known as secret key encryption. |
centralized | A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers. |
transport | The _____ layer of the Open Systems Interconnection (OSI) model generates a receiver’s address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication. |
Protocol | _________ is a set of rules that govern data communication, including error detection, message length, and transmission speed. |
speed of its interconnections | The data transfer speed of a wide area network (WAN) depends on the _____. |
Digital subscriber line (DSL) | _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data. |
It requires major network upgrades, because video requires much more bandwidth. | Identify a true statement about convergence in data communication. |
tree | A hierarchical topology is also called a _____ topology. |
Hierarchical topology | Identify a topology used by traditional mainframe networks. |
Network layer | Identify the layer of the Open Systems Interconnection (OSI) model in which the Internet Protocol (IP) operates. |
packet | A _________ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network. |
nodes on a network | A routing table lists _____. |
Transport layer | Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data. |
dynamic router | A(n) _____ is a network connection device, which can build tables that identify addresses on each network. |
Time Division Multiple Access (TDMA) | In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots. |
It ensures a tight control over system operations and applications. | Identify an advantage of centralized processing. |
multiplexer | A _____ is a hardware device that allows several nodes to share one communication channel. |
conducted | In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics. |
application | The _____ layer of the Open Systems Interconnection (OSI) model serves as the window through which computer programs access network services. |
Terrestrial microwave | Which of the following media is based on line of sight |
WPA2 (Wi-Fi Protected Access 2) | A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key? |
integrate services to a single building or campus | Local area networks (LANs) are used to _____. |
It solves the lack of responsiveness in centralized processing. | Identify a true statement about distributed processing. |
Physical and Data Link | A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers. |
terminator | In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal. |
The user creates a query by running client software. | Which of the following events takes place in the most basic client/server configuration? |
Creation of online copyright-protection schemes continues to be a challenge. | Which of the following statements is true of Web applications? |
Cascading Style Sheets (CSS) | In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________. |
Social networking | _____ refer(s) to a broad class of Web sites and services that allow users to connect with friends, family, and colleagues online as well as meet people with similar interests or hobbies. |
Internet backbone | The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth. |
IP addresses | DNS (Domain Name System) servers translate all domain names into _____. |
fiber-optic | The Internet backbone is a foundation network linked with _____ cable(s) that can support very high bandwidth. |
teleimmersion system | A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web. |
keywords | Housed at server farms, search engines use _____ to index data coming in from crawlers. |
Internet telephony | _________ is a service that uses the Internet rather than the network to exchange spoken conversations. |
SMTP | Which of the following protocols is used to send e-mails? |
extranet | A(n) _________ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so communication between organizations is possible. |
Community TLDs are limited to members of a defined community. | Which of the following statements is true of community top-level domains (TLDs)? |
client-based | Microsoft Outlook is an example of a _____ e-mail program. |
XML tags represent the kind of content being posted and transmitted. | Which of the following statements is true of Extensible Markup Language (XML)? |
E-collaboration | Which of the following is an important application of data communication systems for managers to contact decision makers located throughout the world? |
Internet Relay Chat (IRC) | _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time. |
Joey is a businessman. He develops cases and covers for mobile phones. He wishes to showcase his products so that more people know about his work. Which of the following will help him in promoting his products? | |
hypertext | The embedded references in hypermedia documents are called _________. |
Podcasts | _________ are usually collected by an “aggregator. |
Discussion groups | _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature. |
Intranets help move from calendar-based document-publishing strategy to one that is based on needs. | In the context of an organization, which of the following statements is true of an intranet? |
hypermedia | The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents. |
.net | _____ is a generic top-level domain name that is used for backbone, regional, and commercial networks. |
Accuracy of information | Which of the following is a serious problem with wikis? |
podcast | A(n) _____ is referred to as an electronic audio file that is posted on the Web for users to download to their mobile devices or computers. |
search engines | Google, Bing, and Ask.com are examples of _____. |
Community TLDs are limited to members of a defined community. | Which of the following statements is true of community top-level domains (TLDs)? |
corporate portals | Intranets are also called _____. |
Directories | _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for. |
Asymmetric DSL (ADSL) | _____ has a lower transmission rate upstream than downstream. |
uniform resource locator (URL) | A(n) _____ is the address of a document or site on the Internet. |
local area network (LAN) | A client can be a home computer or a node in an organization’s _____. |
Internet Protocol (IP) addresses | When information is transferred from one network to another, domain names are converted to _________ by the Domain Name System (DNS) protocol. |
Internet telephony | _________ is a service that uses the Internet rather than the network to exchange spoken conversations. |
Discussion groups | _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature. |
Cascading Style Sheets (CSS) | In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________. |
Crawlers | _____, a software used by search engines, can go through the other pages that are part of a Web site, as long as there are links to those pages. |
It is used to create Web pages. | What is the use of Hyper Text Markup Language (HTML)? |
An intranet is different from a local area network (LAN), although it uses the same physical connections. | Identify a true statement about intranets. |
Internet Relay Chat (IRC) | _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time. |
search engine | A _____ is an information system that enables users to retrieve data from the Web by using keywords. |
Web 3.0 | The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs. |
client-based | Microsoft Outlook is an example of a _____ e-mail program. |
Web browsers | Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____. |
podcast | A(n) _____ is referred to as an electronic audio file that is posted on the Web for users to download to their mobile devices or computers. |
Internet backbone | The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth. |
Accuracy of information | Which of the following is a serious problem with wikis? |
An extranet | _____ is considered a type of interorganizational system (IOS). |
teleimmersion system | A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web. |
/˜hbidgoli | In the URL _____ represents the name of the directory in which files are stored. |
do not have a physical location to help maintain current customers | Service and support are even more important in e-commerce than in traditional commerce because e-commerce companies _____. |
electronic payment | A(n) _____ refers to exchange of money or scrip electronically. |
splash screen | A Web page displayed when a user first visits a site is called a(n) _____. |
Push technology | In Web marketing, identify the technology in which information is sent to users based on their previous inquiries, interests, or specifications. |
Wireless Application Protocol | Mobile commerce (m-commerce) is based on the _____. |
business-to-business (B2B) | Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks. |
They are supported by short-range wireless communication technologies. | Which of the following is true of mobile commerce (m-commerce) applications? |
E-business | _____ includes transactions that support revenue generation by generating demand for goods and services, offering sales support and customer service, facilitating communication between business partners, and similar activities. |
margin | The _____ represents the value added by supporting primary activities of a value chain. |
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit. | Identify a true statement about cookies. |
hit | Any element of a Web page that is clicked counts as a _____ to a server. |
Improving customer service | Which of the following is an advantage of e-commerce? |
Price transparency | _____, in e-commerce, means all market participants can trade at the same price. |
Web sites | E-commerce fulfills the product information activity using _____. |
Brokerage model | Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties. |
ebXML allows you to select only the data requested in a search. | In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML). |
buyer-side marketplace | A(n) _____ enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products initiated by a group of consumers. |
Search engine optimization | _____ is a method for improving the volume or quality of traffic to a Web site. |
merchant model | The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet. |
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens. | Identify a true statement about in-game mobile marketing. |
intrabusiness | E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model. |
The goal of selling products to generate profit is the same. | Identify a similarity between e-commerce and traditional commerce. |
E-procurement | Identify an application of the seller-side marketplace model that has the main objective of preventing purchases from suppliers that are not on the approved list of sellers. |
government-to-government (G2G) | Crisis response is categorized as a _____ application. |
Third-party exchange marketplace | Identify a marketplace model that generates revenue from the fees charged for matching buyers and sellers. |
merchant model | The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet. |
Information sharing | _____ is the first activity to be involved in a typical business-to-consumer (B2C) cycle. |
Improving customer service | Which of the following is an advantage of e-commerce? |
Price transparency | _____, in e-commerce, means all market participants can trade at the same price. |
vertical market | In a third-party exchange marketplace, the sale of medical products is an example of a(n) _____. |
splash screen | A Web page displayed when a user first visits a site is called a(n) _____. |
buyer-side marketplace | A(n) _____ enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products initiated by a group of consumers. |
Operations | Which of the following primary activities in a value chain involves processing raw materials into finished goods and services? |
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens. | Identify a true statement about in-game mobile marketing. |
They are supported by short-range wireless communication technologies. | Which of the following is true of mobile commerce (m-commerce) applications? |
horizontal | A(n) _____ market concentrates on a specific function or business process and automates this function or process for different industries. |
Search engine optimization | _____ is a method for improving the volume or quality of traffic to a Web site. |
business-to-business (B2B) | Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks. |
E-procurement | Identify an application of the seller-side marketplace model that has the main objective of preventing purchases from suppliers that are not on the approved list of sellers. |
infomediary model | E-commerce sites that use the _____ collect data on consumers and businesses and then sell this data to other companies for marketing purposes. |
government-to-government (G2G) | Crisis response is categorized as a _____ application. |
hit | Any element of a Web page that is clicked counts as a _____ to a server. |
subscription model | In the _____, an organization uses e-commerce sites to sell digital products and services. |
The goal of selling products to generate profit is the same. | Identify a similarity between e-commerce and traditional commerce. |
intrabusiness | E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model. |
ebXML allows you to select only the data requested in a search. | In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML). |
Brokerage model | Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties. |
smart card | A _____ is about the size of a credit card and contains an embedded microprocessor chip storing important financial and personal information. |
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit. | Identify a true statement about cookies. |
Technological development | Which of the following is a supporting activity in a value chain? |
globalization | The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain. |
Tactical | _____ support of a global information system (GIS) concentrates on medium-range activities that move an organization toward achieving long-term goals. |
MNCs deliver products and services across national borders. | Which of the following statements is true of multinational corporations (MNCs)? |
data security | Transborder data flow (TDF) comprises national laws and international agreements on _____. |
The usage on a global scale is more challenging than doing so on a local scale. | Which of the following is true of information systems? |
Improved telecommunication systems | Which of the following factors has made offshore outsourcing attractive for all types of organizations? |
noise | The _____ factor involves how immune a communication medium is to outside electronic interference. |
global information system | Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods. |
integrated | A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS). |
severe shortage | There is a(n) _____ of qualified information systems professionals in the United States and Western Europe. |
e-business | By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities. |
transnational | An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. |
can increase its control over its subsidiaries | An international company with a global information system (GIS) in place _____. |
Strategic | _____ support of a global information system (GIS) involves broad and long-term goals. |
Operational | In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities? |
Management of global tax risk | Which of the following is a strategic requirement for a global information system (GIS)? |
production and marketing | Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market. |
synchronous | With _____ transmission, both parties in a global network are connected at the same time, as in a phone call. |
regionalizing | A manufacturer moving operations to another country because of advantages available in that country is involved in _____ the operations. |
defined behaviors for different processes | Control in a global information system (GIS) requires _____. |
standardization within departments | The coordination dimension of a global information system (GIS) requires _____. |
cheap labor | Initially, offshore outsourcing was used mostly in manufacturing to find _____. |
switching nodes | A global network must have _____ to guide packets to their destinations. |
standardization | One of the issues with a global information system (GIS) is that too much _____ can decrease an organization’s flexibility in responding to local preferences and even time differences. |
coordination | In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different specialized parts of an organization. |
planning phase | During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem. |
Economic feasibility | _____ assesses an information system’s costs and benefits. |
It incorporates varying viewpoints from different functional areas of an organization to help ensure that collected requirements for the application are not too narrow or one-dimensional in focus. | Which of the following is an advantage of a joint application design (JAD)? |
Immediate feedback from users | Identify a key feature of extreme programming (XP). |
A lengthy time frame makes a request for proposal less appealing. | Identify a disadvantage of a request for proposal (RFP). |
pilot conversion | During the implementation phase of the systems development life cycle (SDLC), in _____, the analyst introduces an information system in only a limited area of an organization, such as a division or department. |
are its customers, contractors, and suppliers | External users of an organization’s information system _____. |
System’s quality is improved by addressing major issues that have not been examined before. | Identify a true statement of extreme programming. |
Both focus on an incremental development process. | Identify a similarity between agile methodology and extreme programming (XP). |
a narrow focus, which might limit future development | One shortcoming of rapid application development (RAD) is _____. |
Outsourcing | Which of the following increases the risk of leaking confidential information to competitors? |
requirements-gathering and analysis phase | In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it. |
physical design | During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language. |
In this, two programmers perform same activities at one workstation. | Identify a true statement about pair programming. |
Internal users | _____ are employees who will use an information system regularly, and they can offer important feedback on the system’s strengths and weaknesses. |
The technique works by determining the critical path for interrelated activities with zero slack time. | Identify a true statement of the Critical Path Method (CPM). |
Management voicing concern about the organization’s lack of a competitive edge in the marketplace | Which of the following is an internally identified problem in information systems? |
design phase | Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC). |
Operational feasibility | _____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it. |
flowchart | A _____ is a tool used in structured systems analysis and design (SSAD) analysis model that illustrates the logical steps in a process but does not show data elements and associations. |
Service-oriented architecture (SOA) | _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization. |
Extreme programming (XP) | _____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished. |
internal rate of return | The most common cost-effectiveness analysis methods are payback, net present value (NPV), return on investment (ROI), and _____. |
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application. | Which of the following is a characteristic of a joint application design (JAD)? |
design phase | During the _____ of the systems development life cycle (SDLC), analysts choose the solution that is the most realistic and offers the highest payoff for an organization. |
e-business | By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities. |
integrated | A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS). |
transnational | An organization with a(n) _____ structure might have several regional divisions that share authority and responsibility, but in general it does not have its headquarters in a particular country. |
production and marketing | Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market. |
control | One of the dimensions along which a global information system (GIS) is defined is _____, which refers to the use of managerial power to ensure adherence to an organization’s goals. |
management | When designing a successful global information system (GIS), _____ cannot assume a company’s products or services will continue selling the same way because of possible changes in customers’ needs and preferences and global competition. |
full-duplex | If a company uses multimedia applications in addition to normal file and database sharing, _____ transmission is more efficient. |
The Internet | _____ can simplify communication, improve business relationships, and offer new opportunities to both consumers and businesses. |
globalization | The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain. |
cheap labor | Initially, offshore outsourcing was used mostly in manufacturing to find _____. |
It facilitates communication between headquarters and subsidiaries in other countries. | Which of the following statements is true of a global information system (GIS)? |
synchronous | With _____ transmission, both parties in a global network are connected at the same time, as in a phone call. |
MNCs deliver products and services across national borders. | Which of the following statements is true of multinational corporations (MNCs)? |
switching nodes | A global network must have _____ to guide packets to their destinations. |
Strategic | _____ support of a global information system (GIS) involves broad and long-term goals. |
can increase its control over its subsidiaries | An international company with a global information system (GIS) in place _____. |
decentralized | Coordination in a global IS requires a(n) _____ architecture for data, standardization within departments, the ability to communicate these standards to other depts, collab systems, & tech that support informal communication & socialization |
multinational | In a _____ structure, production, sales, and marketing are decentralized and financial management remains the parent company’s responsibility. |
defined behaviors for different processes | Control in a global information system (GIS) requires _____. |
The usage on a global scale is more challenging than doing so on a local scale. | Which of the following is true of information systems? |
global information system | Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods. |
global | One of the issues with the _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation. |
Operational | In the context of a global information system (GIS), which of the following kinds of managerial support involves day-to-day activities? |
An extensive communication network is necessary to manage a global structure. | Which of the following statements is true of a global organization structure? |
different character sets used for the names of people and places | Designing and implementing a global database is a technical challenge, mainly because of the _____. |
system specifications document | The _____, which indicates the start of the design phase, is created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC). |
Outsourcing | Which of the following increases the risk of leaking confidential information to competitors? |
physical design | During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language. |
nearshore outsourcing | With _____, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico. |
maintenance phase | During the _____ of the systems development life cycle (SDLC), an information system is operating, enhancements and modifications to the system have been developed and tested, and hardware and software components have been added or replaced. |
Operational feasibility | _____ is the measure of how well a proposed solution will work in an organization and how internal and external customers will react to it. |
conceptual design | In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices. |
data flow diagram | A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses. |
Rapid application development (RAD) | _____ uses an iterative process that repeats the design, expansion, and testing steps as needed, based on feedback from users. |
onshore outsourcing | With _____, an organization chooses an outsourcing company in the same country. |
Immediate feedback from users | Identify a key feature of extreme programming (XP). |
a narrow focus, which might limit future development | One shortcoming of rapid application development (RAD) is _____. |
Self-sourcing | _____ helps reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs. |
Both focus on an incremental development process. | Identify a similarity between agile methodology and extreme programming (XP). |
planning phase | During the _____ of the systems development life cycle (SDLC) model, an information systems designer must define the problem an organization faces, taking care not to define symptoms rather than the underlying problem. |
A lengthy time frame makes a request for proposal less appealing. | Identify a disadvantage of a request for proposal (RFP). |
Systems development life cycle (SDLC) develops the entire system at once, whereas extreme programming (XP) uses incremental steps to improve an information system’s quality. | Identify a difference between the systems development life cycle (SDLC) and extreme programming (XP). |
waterfall model | The systems development life cycle (SDLC) is also known as the _____. |
proof-of-concept prototype | A _____ shows users how a particular task that was not technically feasible can be done. |
The technique works by determining the critical path for interrelated activities with zero slack time. | Identify a true statement of the Critical Path Method (CPM). |
System’s quality is improved by addressing major issues that have not been examined before. | Identify a true statement of extreme programming. |
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application. | Which of the following is a characteristic of a joint application design (JAD)? |
planning phase | During the _____ of the systems development life cycle (SDLC), analysts investigate a proposed solution’s feasibility and determine how best to present the solution to management to get funding. |
Management voicing concern about the organization’s lack of a competitive edge in the marketplace | Which of the following is an internally identified problem in information systems? |
logical design | In the design phase of the systems development life cycle (SDLC), the _____ indicates hardware and software, such as specifying Linux servers and Windows clients. |
An e-distributor offers fast delivery of a wide selection of products and services. | Which of the following statements is true of an e-distributor? |
Distribution centre | In manufacturing, identify one of the major links in the supply chain. |
unified database | The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external data and information needed by other functions. |
Personalization | In the context of a customer relationship management (CRM) systems, identify a technology used to gather information about customers’ preferences and shopping patterns. |
manufacturers | In a manufacturing firm’s supply chain, raw materials flow from suppliers to _____. |
brokerage | An online auction is based on the _____ business model of e-commerce. |
Distribution centers | In service organizations, what is considered to be one of the major links in the supply chain? |
maintenance, repair, and operations | In the context of e-marketplaces, a company can purchase a(n) _____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers. |
An enterprise system is an application used in all the functions of a business. | Identify a true statement about an enterprise system. |
Need for extensive training | Which of the following is a disadvantage of an enterprise resource planning (ERP) system? |
Financial reporting | In supply chain management (SCM), identify a process in which electronic data interchange (EDI) accelerates the delivery of accurate information. |
E-marketplaces | Which of the following helps businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock? |
inventory management | In the context of an Internet-enabled supply chain management (SCM) system, activities providing real-time stock information and replenishing stock quickly are part of _____. |
Traditional EDI is more beneficial when there are more companies in the EDI network. | Which of the following statements is true of traditional electronic data interchange (EDI)? |
Electronic data interchange | In supply chain management (SCM), which of the following is substituted by companies for printing, mailing, and faxing paper documents? |
online auction | In a supply chain management (SCM) system, typically, an organization hosting an _____ collects transaction fees for the service. |
“Web-based” EDI reduces the cost of transmitting documents with the help of the Internet. | Identify a true statement about “Web-based” EDI or “Open EDI.” |
Knowledge management (KM) | Identify a technique that improves customer relationship management (CRM) systems by identifying, storing, and disseminating “know-how.” |
Information flow | In a manufacturing firm’s supply chain management (SCM) system, which flow oversees order transmission? |
Finances flow | In a manufacturing firm’s supply chain management (SCM) system, which flow handles credit terms and payment schedules? |
purchasing/procurement | In the context of Internet-enabled supply chain management (SCM), bargaining and renegotiating prices and term agreements are part of _____ activities. |
It improves operational efficiency and manages inventory. | Which of the following statements is true of collaborative planning, forecasting, and replenishment (CPFR)? |
A data-mining tool | In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers’ buying patterns? |
It is a cost-effective method for selling excessive inventory. | Which of the following statements is true of online auctions? |
Customer relationship management | Which of the following systems’ goal is to improve services offered to consumers and use consumer contact information for targeted marketing? |
Reduction in stress levels | Which of the following is an advantage of a group support system (GSS)? |
The decision maker’s intuition plays a major role in one-time decisions. | Identify a true statement about unstructured decisions. |
technical designer | In the decision support system (DSS) environment, a _____ focuses on how the DSS is implemented and usually addresses questions about data storage, file structure, user access, response time, and security measures. |
Semistructured | _____ decisions include a structured aspect that benefits from information retrieval, analytical models, and information systems technology. |
semistructured | Sales forecasting is an example of a(n) _____ task. |
executive information system (EIS) | For a(n) _____ to be useful, it should collect data related to an organization’s critical success factors—issues that make or break a business. |
Fast response to unexpected situations | According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)? |
Groupware | _____ is a collection of applications that supports decision makers by providing access to a shared environment and information. |
Points | Which of the following geographic objects of a geographic information system (GIS) is most likely used to show the location of an airport? |
Intelligent agents | _____ are programs that carry out repetitive tasks and can be programmed to make decisions based on specified conditions. |
unstructured | Research and development is an example of a(n) _____ decision. |
unstructured | Resolving conflicts between two divisions is a type of _____ decision at the tactical management level. |
Budget preparation | In which of the following areas is a semistructured decision often used? |
spatial data | A GIS with analytical capabilities evaluates the impact of decisions by interpreting _____. |
Spotting trends | Which of the following tasks performed by managers uses an executive information system (EIS)? |
Unnecessary meetings | Identify a disadvantage of group support systems (GSSs)? |
intelligence phase | In the _____ of the decision-making process, data is collected from internal and external sources and processed. |
unstructured | Setting queue priorities is a type of _____ decision at the operational management level. |
Government | _____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations. |
Find zip codes of areas with high population | Identify a task performed by a geographic information system (GIS). |
Electronic meeting systems | _____ enable decision makers in different locations to participate in a group decision-making process. |
Introducing a new product | In which of the following areas is an unstructured decision often used? |
Structured | _____ decisions can be automated because a well-defined standard operating procedure exists for these types of decisions. |
geographic information system (GIS) | A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rivers, streets) and reporting zones (zip codes, cities, counties, states). |
Desktop conferencing enables participants to have multiple video windows open at one time. | Identify a characteristic of electronic meeting systems. |
DENDRAL | _____ was the first expert system developed to determine the chemical structure of molecules. |
expert system | Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. |
Inference engine | Which component of an expert system uses forward and backward chaining to manipulate a series of rules? |
Monitoring and surveillance | _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur. |
`Shopping and information | _____ agents can serve as search engines, site reminders, or personal surfing assistants. |
It adds the capability to handle fuzzy data. | Which of the following is true of integrating an expert system into the database component of a DSS? |
knowledge acquisition facility | In the context of an expert system, a(n) _____ works with the knowledge base management system to ensure that the knowledge base is as up to date as possible. |
Meta-knowledge | _____ is the knowledge base component of an expert system and enables an expert system to learn from experience and examine and extract relevant facts to determine the path to a solution. |
heuristics | In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments. |
if | In forward chaining technique used by the inference engine component of an expert system, the _____ condition is evaluated first. |
Autonomy | Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input. |
personal | A(n) _____ agent can be used to automatically fill out Web forms. |
inference engine | In the context of the components of an expert system, a(n) _____ is similar to the model base component of a decision support system (DSS). |
case-based | Hewlett-Packard uses _____ reasoning to assist users of its printers. |
retain | The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____. |
artificial neural network | Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. |
Natural-language processing | _____ was developed so that users could communicate with computers in human language. |
mobility | The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention. |
bots | Intelligent agents are also known as _____. |
PortBlue | _____ is an example of an expert system that can be applied to various financial applications. |
Genetic algorithms | _____ are used with neural networks and fuzzy logic systems to solve scheduling, engineering design, and marketing problems. |
DSS (Decision Support System) | Adding deductive reasoning to traditional DBMS functions is a benefit of integrating an expert system into the database component of a(n) _____. |
Fuzzy logic | _____ is designed to help computers simulate vagueness and uncertainty in common situations. |
Expert | _____ systems have been one of the most successful artificial intelligence (AI)-related technologies. |
They have limited mobility. | Which of the following statements is true of personal robots? |
hybrid | A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world. |
Software as a service | In the context of application software providers (ASPs), which of the following is also known as “on-demand software”? |
Central coordinating processor and software system | Identify a component of a virtual reality (VR) system that generates and manipulates high-quality graphics. |
Biometric | _____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing. |
virtual world | A(n) _____ is a simulated environment designed for users to interact via avatars. |
Passive | _____ radio frequency identification (RFID) tags have no internal power supply. |
private | In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself. |
Web browsers | Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____. |
Private cloud | GuardIT,security company, work w companies2obtain intel property&protect em.deals w secure data4variety of software&e-commerce agreements,TM&patent licenses.cloud comput optn wld b most suitable? |
cave automatic virtual environment (CAVE) | A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines. |
nanoscale | Nanotechnology incorporates techniques that involve the structure and composition of materials on a _____. |
Regulatory compliance | _____ is a cloud-computing risk that deals with the availability of external audits and security certifications. |
Cloud computing | _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0. |
Data segregation | _____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud. |
community | Allocation of cost and responsibilities, governance, and the implementation of a tight security system are the major obstacles while using a _____ cloud computing option. |
scanner | In order to read a QR (quick response) code using a smartphone, one must have the _____ app. |
Active | _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin. |
Infrastructure as a service (IaaS) | VT offer cloud comput serv to several data centers in the world.provide comp infrastructure - servers, networking elements, and SaaS.own the equipment&are liable for housing,functioning,&maintaining it.type of cloud comput model VT delivers as a service? |
networked communication | In the context of virtual reality (VR), _____ refers to the concept of allowing users in different locations to interact and manipulate the same world at the same time by connecting two or more virtual worlds. |
Platform as a service (PaaS) | _____ automates the configuration, deployment, and ongoing management of applications in the cloud. |
push | With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them. |
hardware as a service (HaaS) | According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____. |
Biometrics | _____ could be useful for authentication purposes in voting via the Internet. |
metropolitan area networks | Worldwide Interoperability for Microwave Access (WiMAX) is designed for wireless _____. |
push | Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees’ workstations. |
knowledge | In the artificial intelligence (AI) field, _____ engineers try to discover “rules of thumb” that enable computers to perform tasks usually handled by humans. |
Monitoring and surveillance | _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur. |
Artificial neural | _____ networks are networks that learn and are capable of performing tasks that are difficult with conventional computers. |
heuristic knowledge | The knowledge base component of an expert system must include _____, which consists of rules related to a problem or discipline. |
case-based | Hewlett-Packard uses _____ reasoning to assist users of its printers. |
Autonomy | Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input. |
then | In backward chaining technique used by the inference engine component, an expert system starts with the _____ condition. |
Natural-language processing | _____ was developed so that users could communicate with computers in human language. |
Variable Assembly Language (VAL) | _____ is a programming language for controlling robots. |
heuristics | In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments. |
bots | Intelligent agents are also known as _____. |
They have limited mobility. | Which of the following statements is true of personal robots? |
Inference engine | Which component of an expert system uses forward and backward chaining to manipulate a series of rules? |
expert system | Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. |
case-based | In design and implementation of any _____ reasoning application there are 4 Rs involved. |
expert systems | In the context of integrating artificial intelligence technologies into a decision support system’s model base component, _____ can be added to include heuristics in the model base’s analysis capabilities. |
Humanlike interface | Identify the characteristic of a sophisticated intelligent agent that demonstrates its capability to interact with users in a more natural language. |
retain | The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____. |
knowledge acquisition facility | In the context of an expert system, a(n) _____ works with the knowledge base management system to ensure that the knowledge base is as up to date as possible. |
robots | _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs. |
artificial neural network | Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____. |
artificial neural network | Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____ |
data warehouse | Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent. |
what-if | In the context of the decision-making analyses that use information technology, _____ analysis is available in spreadsheet programs such as Microsoft Excel. |
databases | An NLP system provides a question-and-answer setting that is particularly useful with _____. |
Expert | _____ systems have been one of the most successful artificial intelligence (AI)-related technologies. |
biometrics | _____ could be useful for authentication purposes in voting via the Internet. |
Nanomaterials | Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance? |
personal area network (PAN) | Bluetooth can be used to create a _____, to communicate among computerized devices. |
Web browsers | Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____. |
interaction | _____ means enabling users to act on objects in a virtual reality (VR) environment, such as using a data glove to pick up and move objects. |
it does not guarantee that an application will fully meet an organization’s needs | One of the major disadvantages of an application service provider (ASP) is that _____. |
scanning tunneling microscope (STM) | The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings. |
push | Network administrators use _____ technology to get antivirus updates to be automatically downloaded on employees’ workstations. |
scanner | In order to read a QR (quick response) code using a smartphone, one must have the _____ app. |
hybrid | A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world. |
radio frequency identification tag | A _____ is a small electronic device consisting of a microchip and an antenna and performs the same task as bar codes. |
quick response code | A _____ is a matrix barcode consisting of black modules arranged in a square pattern on a white background. |
active | _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin. |
hardware as a service (HaaS) | According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____. |
telepresence | In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location. |
software as a service (SaaS) | With the _____ model, users do not need to be concerned with new software versions and compatibility problems because the application service providers (ASPs) offer the most recent version of the software. |
public | _____ clouds are more suitable for organizations that need scalability, do collaborative projects, and offer standard applications over the Web. |
Biometric | _____ measures could add another layer of security to Web pages to guard against attacks and eliminate or reduce defacing. |
cloud computing | _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0. |
metropolitan area networks | Worldwide Interoperability for Microwave Access (WiMAX) is designed for wireless _____. |
public cloud computing | WPis in the process of shifting its list of inven2cloud4easier access among its diff branches.company trying to find a cloud comput optn that offers highest cost saving&requires least amt of involv by IT mngrs.Wich cloud computing optn wld b the best4WP? |
push | With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them. |
data segregation | _____ is a cloud computing risk that deals with how a particular type of data is to be kept separate from other data in the cloud. |
ASPs ensure that software is kept up to date, based on users’ requests. | Which of the following is an advantage of application service providers (ASPs)? |