Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CIS Exam 1

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
show Which of the following strategies was identified by Michael Porter to successfully compete in the marketplace?  
🗑
show Identify the output of an information system.  
🗑
providing information in a useful format for decision-making purposes   show
🗑
supplier   show
🗑
differentiation strategy   show
🗑
show In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.​  
🗑
show Identify the true statement about transaction-processing systems  
🗑
show Identify the component of an information system that consists of facts analyzed by the process component.  
🗑
show The _________ component of an information system is considered the input to the system.  
🗑
it allocates human and financial resources   show
🗑
selecting the best modes of transportation   show
🗑
show Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?  
🗑
show To be useful, information must have the quality of _____.  
🗑
providing an inexpensive medium for targeting a large customer base   show
🗑
show Why do information systems use graphical user interfaces (GUIs)?  
🗑
marketing information systems (MKIS)   show
🗑
show Which of the following is one of the forces of the Five Forces Model identified by Michael Porter?  
🗑
It is a network within an organization that uses Internet protocols and technologies.   show
🗑
It focuses on generating new revenue by offering new products and services.   show
🗑
show Identify the true statement about the data component of an information system.  
🗑
labor statistics   show
🗑
produce information in different formats   show
🗑
database administrator   show
🗑
show Identify the term that provides historical and predictive views of business operations.  
🗑
show _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.  
🗑
show A(n) _____ is a communication interface through which information is transferred one bit at a time.  
🗑
show A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.  
🗑
show Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide.  
🗑
kernel   show
🗑
The contents of programmable read-only memory cannot be reprogrammed.   show
🗑
show A _____ is the size of a character.  
🗑
show An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources?  
🗑
computer-aided design   show
🗑
random access memory (RAM)   show
🗑
show A _____ is a link between devices connected to a computer.  
🗑
show Identify a computer language that is machine dependent.  
🗑
cloud   show
🗑
microsoft windows   show
🗑
show _____ computer languages are machine independent and are called high-level languages.  
🗑
show A _____ is a peripheral device for recording, storing, and retrieving information.  
🗑
show Which of the following statements is true of inkjet printers?  
🗑
128   show
🗑
show _____ means saving data in computer memory.  
🗑
high-level   show
🗑
show Identify a true statement about laser printers.  
🗑
liquid crystal display   show
🗑
256   show
🗑
redundant array of independent disks   show
🗑
show Third-generation computers introduced _____.  
🗑
It is a set of programs for controlling and managing computer hardware and software   show
🗑
it focuses on improving efficiency by reducing overall costs   show
🗑
show Identify how information systems help an organization.  
🗑
It focuses on generating new revenue by offering new products and services.   show
🗑
show _____ is high when customers have many choices and low when they have few choices.  
🗑
chief technology officer   show
🗑
information literacy   show
🗑
commercial programs   show
🗑
show Identify a true statement about database management systems.  
🗑
Aggregated data enables decision makers to focus on specific factors.   show
🗑
network administrator   show
🗑
show The _________ component of an information system is considered the input to the system.  
🗑
show _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.  
🗑
supplier   show
🗑
computer literacy   show
🗑
information   show
🗑
show The purpose of an information system’s _____ component is generating the most useful type of information for making decisions.  
🗑
show Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as _____.  
🗑
show Which of the following decisions is supported by a logistics information system (LIS)?  
🗑
show Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____.  
🗑
show Identify the term that provides historical and predictive views of business operations.  
🗑
show UNIX is a type of _____.  
🗑
data codes   show
🗑
show A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning.  
🗑
show _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.  
🗑
show _____ computer languages are machine independent and are called high-level languages.  
🗑
program   show
🗑
random access memory (RAM)   show
🗑
show identify a true statement about memory devices  
🗑
show Identify an input device used to grade multiple-choice and true/false tests.  
🗑
ROM is nonvolatile memory, whereas RAM is volatile memory.   show
🗑
show The word computer consists of 64 bits, which is equivalent to _____ bytes.  
🗑
show Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.  
🗑
show A write once, read many (WORM) disc is a common type of _____.  
🗑
show Identify the file in which each alphabetic, numeric, or special character is represented with a 7-bit binary number.  
🗑
vacuum tube technology   show
🗑
show Third-generation computers introduced _____.  
🗑
show A _____ allows data to be stored in multiple places to improve a system’s reliability.  
🗑
occupy less space than a mouse   show
🗑
database engine   show
🗑
it uses more sophisticated security measures   show
🗑
external and internal   show
🗑
indexed sequential access method   show
🗑
show In data warehouses, _____ is information in its original form.  
🗑
show The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met  
🗑
store multidimensional data   show
🗑
show A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.  
🗑
data mining tools   show
🗑
show In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.  
🗑
data mart   show
🗑
show In the context of data administration component, the acronym CRUD stands for _____.  
🗑
mobile and wireless technology   show
🗑
attributes   show
🗑
operations   show
🗑
enterprise resource planning systems   show
🗑
show To begin designing a relational database, one must define the _____ by defining each table and the fields in it.  
🗑
developing recovery procedures in case data is lost or corrupted   show
🗑
allocation   show
🗑
show _____, a component of a data model, defines the boundaries of a database, such as maximum and minimum values allowed for a field.  
🗑
summary data   show
🗑
show In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.  
🗑
metadata   show
🗑
show The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.  
🗑
data definition   show
🗑
show Whenever a user accesses the same domain, the browser sends saved information to the _________.  
🗑
They let independent customers share skills and have access to each other’s markets via information technologies.   show
🗑
show In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.  
🗑
show _____ is registering, selling, or using a domain name to profit from someone else’s trademark.  
🗑
show In the context of Web and network privacy, _____ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.  
🗑
trademark   show
🗑
industrial   show
🗑
spam   show
🗑
show The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.  
🗑
show Identify a true statement about copyrights.  
🗑
show The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment.  
🗑
reduces employee turnover   show
🗑
show Which of the following is a commonly used technology for data collection?  
🗑
By using video conferencing, electronic meeting systems, and groupware   show
🗑
show Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.  
🗑
show Which of the following is a benefit of using patents in organizations?  
🗑
URL hijacking   show
🗑
copyright   show
🗑
show Identify a true statement about information technology in social divisions.  
🗑
legal and ethical   show
🗑
show In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.  
🗑
show Which of the following statements is true of virtual organizations?  
🗑
when experienced labor is eliminated by high technology   show
🗑
skills are shared among participating companies of a virtual organization   show
🗑
show _________ is computing that promotes a sustainable environment and consumes the least amount of energy.​  
🗑
show In the context of security threats, _________ means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.​  
🗑
signature analysis   show
🗑
pharming   show
🗑
show _____ is a commonly used encryption protocol that manages transmission security on the Internet.  
🗑
show A level 1 security system is used to protect _____ against unauthorized access.  
🗑
show _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.  
🗑
Trojan programs   show
🗑
show To ensure confidentiality, accuracy, and integrity of data, a level 2 security system protects _____.  
🗑
show A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.  
🗑
show _____ is the process of capturing and recording network traffic.  
🗑
show _________ is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.​  
🗑
show In nonbiometric security measure, a _____ is a software that acts as an intermediary between two systems.  
🗑
show Which of the following is a nonbiometric security measure?  
🗑
symmetric   show
🗑
show when does spoofing occur?  
🗑
show identify a true statement about firewalls  
🗑
show Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.  
🗑
show _____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.  
🗑
show _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.  
🗑
show When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.  
🗑
It is an independent program that can spread itself without attaching itself to a host program.   show
🗑
show In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.  
🗑
show Which of the following is true of phishing?  
🗑
spyware   show
🗑
worm   show
🗑
show In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.  
🗑
show In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.  
🗑
radiated   show
🗑
hierarchical topology   show
🗑
show A(n) _____ cable is used to connect computers, hubs, switches, and routers to a network  
🗑
show Transmission of data across satellites is through _____.  
🗑
show In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.  
🗑
digital subscriber line (DSL)   show
🗑
protocol   show
🗑
show Local area networks (LANs) are used to _____.  
🗑
It requires major network upgrades, because video requires much more bandwidth.   show
🗑
network layer   show
🗑
speed of its interconnections   show
🗑
bandwidth   show
🗑
show _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.  
🗑
show A routing table lists _____.  
🗑
Asynchronous Transfer Mode (ATM)   show
🗑
show Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data.  
🗑
show A _____ is a hardware device that allows several nodes to share one communication channel.  
🗑
WPA (Wi-Fi Protected Access)   show
🗑
tree   show
🗑
adding more workstations   show
🗑
An n-tier architecture helps improve network performance   show
🗑
it handles steady traffic well   show
🗑
internet protocol (IP)   show
🗑
Assymetric DSL (ADSL)   show
🗑
/˜hbidgoli   show
🗑
show Which of the following statements is true of Extensible Markup Language (XML)?  
🗑
hyphens   show
🗑
gigapop   show
🗑
show DNS (Domain Name System) servers translate all domain names into _____.  
🗑
show _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.  
🗑
show The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs.  
🗑
server   show
🗑
show In the context of an organization, which of the following statements is true of an intranet?  
🗑
show Which of the following statements is true of geographic top-level domains (TLDs)?  
🗑
crawlers   show
🗑
blog   show
🗑
show Identify a true statement about Voice over Internet Protocol (VoIP).  
🗑
show A(n) _____ is the address of a document or site on the Internet.  
🗑
hypermedia   show
🗑
voice over internet protocol (VOIP)   show
🗑
client-based   show
🗑
show Which of the following protocols is used to send e-mails?  
🗑
podcast   show
🗑
show _____ are unique identifiers of computer or network addresses on the Internet.  
🗑
show Which of the following is a drawback of Internet telephony?  
🗑
instant messaging (IM)   show
🗑
teleimmersion system   show
🗑
show Which of the following is also known as “the Semantic Web”?  
🗑
They focus on data collection and processing.   show
🗑
show Which of the following decisions is supported by a manufacturing information system (MFIS)?  
🗑
show To be useful, information must have the quality of _____.  
🗑
It helps the organization reduce cost of products and services.   show
🗑
show In the context of the information technology (IT) jobs, in the information systems field, a _________ designs and maintains the organization’s Web site.​  
🗑
Information literacy   show
🗑
show _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.  
🗑
show To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____.  
🗑
show Why do information systems use graphical user interfaces (GUIs)?  
🗑
show Building and integrating analytics capabilities into all everyday business activities is known as _____.  
🗑
They can automate repetitive operations.   show
🗑
show Identify the output of an information system.  
🗑
supplier   show
🗑
show Identify the component of an information system that consists of facts analyzed by the process component.  
🗑
show Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?  
🗑
computer literacy   show
🗑
show Which of the following statements is true of data?  
🗑
short-message service   show
🗑
produce information in different formats   show
🗑
show Which of the following decisions is supported by a financial information system (FIS)?  
🗑
show In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.​  
🗑
show _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.  
🗑
show The top information systems job belongs to the _________.  
🗑
show In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy.  
🗑
show _____ is a social networking Web site.  
🗑
Remote access servers   show
🗑
optical storage   show
🗑
show A _____ is the size of a character  
🗑
show Trackballs are ideal for notebook computers because they _____.  
🗑
Laser printers use toners to create high-quality output.   show
🗑
show Identify a true statement about memory devices.  
🗑
redundant array of independent disks   show
🗑
show Which of the following memory devices allows data to be read and written?  
🗑
liquid crystal display   show
🗑
show How is read-only memory (ROM) different from random access memory (RAM)?  
🗑
Silicon cannot emit light and has speed limitations.   show
🗑
8   show
🗑
show A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.  
🗑
show Which of the following statements is true of inkjet printers?  
🗑
show An advantage of silicon over gallium arsenide is that _____.  
🗑
show _____ computer languages are machine independent and are called high-level languages.  
🗑
It is a set of programs for controlling and managing computer hardware and software.   show
🗑
show Which of the following is the OS for most PCs and belongs to the system software group?  
🗑
show Identify a true statement about the supervisor program.  
🗑
show Identify a computer language that is machine dependent.  
🗑
mouse   show
🗑
show _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.  
🗑
show Beginning in the 1940s, first-generation computers used _____.  
🗑
show The supervisor program in an operating system (OS) is called the _____.  
🗑
random access memory (RAM)   show
🗑
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses.   show
🗑
show In a database, which of the following is a source of internal data?  
🗑
Mobile and wireless technology   show
🗑
Enterprise resource planning systems   show
🗑
structured data and unstructured data   show
🗑
show Which of the following factors has made big data analytics accessible to nearly all types of organizations?  
🗑
show Identify the number of physical views of data for a database.  
🗑
attributes   show
🗑
focuses on a specific area   show
🗑
show A(n) _____ is not limited by the data’s physical location.  
🗑
warehouse   show
🗑
show Data warehouses are sometimes called “hypercubes” because they _____.  
🗑
AND   show
🗑
show The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication.  
🗑
Tax records   show
🗑
foreign   show
🗑
show In a(n) _____ model, nodes with the same parents are called siblings.  
🗑
extraction   show
🗑
data model   show
🗑
database engine   show
🗑
data dictionary   show
🗑
show To begin designing a relational database, one must define the _____ by defining each table and the fields in it.  
🗑
show In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics.  
🗑
Data in a flat file system may not be updated in all files consistently.   show
🗑
show Which of the following statements is true of big data?  
🗑
show Identify a program used by parents to prevent their children’s access to certain Web sites.  
🗑
show _____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.  
🗑
smart   show
🗑
The speed of the Internet connection also plays a role in digital divide discussion.   show
🗑
patent   show
🗑
typosquatting   show
🗑
Products are customized more to respond to customers’ needs.   show
🗑
By using video conferencing, electronic meeting systems, and groupware   show
🗑
show _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.  
🗑
show In the context of privacy issues, in an organization, a new employees have to sign a(n) _________ before they access the network.  
🗑
Copyrights’ length vary based on the type of work.   show
🗑
show _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.  
🗑
show Which of the following is true about virtual organizations?  
🗑
legal but unethical   show
🗑
show _____ can rise to an unmanageable level quickly, clogging users’ in-boxes and preventing access to legitimate e-mails.  
🗑
show Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?  
🗑
show In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.  
🗑
show In the context of virtual organizations, the cost of hiring additional employees is reduced because _____.  
🗑
show The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.  
🗑
show Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.  
🗑
use verification procedures to ensure data accuracy   show
🗑
Cybersquatting   show
🗑
show Whenever a user accesses the same domain, the browser sends saved information to the _________.  
🗑
Communications Decency Act   show
🗑
Organizations can use patents to keep competitors from entering certain market segments   show
🗑
AND   show
🗑
show The _____ method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.  
🗑
show The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval.  
🗑
warehouse   show
🗑
show Which of the following is an example of a source for external data?  
🗑
show In a(n) _____ model, nodes with the same parents are called siblings.  
🗑
show In a relational database model, the rows are known as _____.  
🗑
show Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?  
🗑
data manipulation   show
🗑
Indexed sequential access method   show
🗑
data mining tools   show
🗑
structured data and unstructured data   show
🗑
show In a relational database model, when a primary key for one table appears in another table, it is called a _____ key.  
🗑
network   show
🗑
create, read, update, and delete   show
🗑
It uses more sophisticated security measures.   show
🗑
show In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____.  
🗑
raw data   show
🗑
show Which of the following statements is true of data marts and data warehouses?  
🗑
show Data warehouses are sometimes called “hypercubes” because they _____.  
🗑
show In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.  
🗑
Only one   show
🗑
show In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.  
🗑
administration   show
🗑
show In data warehouses, _____ gives users subtotals of various categories, which can be useful.  
🗑
reduces employee turnover   show
🗑
Copyrights’ length vary based on the type of work.   show
🗑
Companies respond to customers faster and more efficiently.   show
🗑
show _____ is registering, selling, or using a domain name to profit from someone else’s trademark.  
🗑
Log files   show
🗑
skills are shared among participating companies of a virtual organization   show
🗑
show Which of the following is a commonly used technology for data collection?  
🗑
Lack of necessary supplies or equipment   show
🗑
not charge different rates on data   show
🗑
CyberSitter   show
🗑
show Identify a true statement about information technology in social divisions.  
🗑
legal but unethical   show
🗑
trademark   show
🗑
reliability   show
🗑
illegal and unethical   show
🗑
show In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.  
🗑
show In general, _____ last the author’s lifetime plus 70 years.  
🗑
Green computing   show
🗑
They let independent customers share skills and have access to each other’s markets via information technologies   show
🗑
cookies   show
🗑
show _________ organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.​  
🗑
trademarks   show
🗑
show A common way to index and link databases is by using _________.  
🗑
needed for the stated purpose   show
🗑
Copyright Act   show
🗑
show Identify a true statement about firewalls.  
🗑
show _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.  
🗑
show What is Spyware?  
🗑
Passwords   show
🗑
backdoor   show
🗑
Asymmetric   show
🗑
blended   show
🗑
show Which of the following is a biometric security measure?  
🗑
show A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access.  
🗑
integrity   show
🗑
show Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?  
🗑
blended threat   show
🗑
show _____ is a computer crime that involves destroying or disrupting computer services.  
🗑
social engineering   show
🗑
show In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.  
🗑
​Asymmetric   show
🗑
show A level 1 security system is used to protect _____ against unauthorized access.  
🗑
Secure Sockets Layer   show
🗑
show In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system.  
🗑
show _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.  
🗑
It involves sending fraudulent e-mails that seem to come from legitimate sources.   show
🗑
show A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.​  
🗑
It occurs when an illegitimate program poses as a legitimate one.   show
🗑
show ​In _____ encryption, the same key is used to encrypt and decrypt a message.  
🗑
Adware   show
🗑
speed of its interconnections   show
🗑
show In _____ processing, each department has its own computer for performing processing tasks.  
🗑
show A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.  
🗑
Digital subscriber line (DSL)   show
🗑
show In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps.  
🗑
Coaxial cables   show
🗑
show Identify an advantage of centralized processing.  
🗑
Network layer   show
🗑
show A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key?  
🗑
transport   show
🗑
show Computers in a local area network (LAN) are usually connected to the network via a(n) _____, which is a hardware component.  
🗑
show Identify an advantage of the bus topology.  
🗑
show A _____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.  
🗑
broadband   show
🗑
It requires major network upgrades, because video requires much more bandwidth.   show
🗑
show A _________ works well for companies that are geographically dispersed.​  
🗑
show In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.​  
🗑
show Which of the following events takes place in the most basic client/server configuration?  
🗑
show _____ cables have the highest bandwidth of any communication medium.  
🗑
WPA (Wi-Fi Protected Access)   show
🗑
show _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.  
🗑
show Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _________ as the communication medium.​  
🗑
Open Systems Interconnection (OSI)   show
🗑
radiated media   show
🗑
show The process of deciding which path data takes on a network is called _____.  
🗑
denial-of-service attack   show
🗑
corporate networks   show
🗑
show Which of the following is considered an intentional security threat?  
🗑
show Which of the following is true of phishing  
🗑
blended threat   show
🗑
Ciphertext   show
🗑
show Which of the following indicates that a computer might be affected by a virus?  
🗑
Passwords   show
🗑
Sabotage   show
🗑
show ​In _____ encryption, the same key is used to encrypt and decrypt a message.  
🗑
show Identify a true statement about firewalls.  
🗑
show A _____ travels from computer to computer in a network but it does not usually erase data.  
🗑
Computer fraud   show
🗑
Spyware   show
🗑
front-end servers   show
🗑
show In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer.  
🗑
show _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.  
🗑
show When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.  
🗑
show Which of the following is true of a worm?  
🗑
show The main function of Cyber Incident Response Capability (CIRC) is to _____.  
🗑
show A(n) _____ is often used so remote users have a secure connection to an organization’s network.  
🗑
show In the context of security threats, _____ takes advantage of the human element of security systems.  
🗑
show The Committee on National Security Systems (CNSS) proposed another model for evaluating information security known as the _____.  
🗑
show Identify an intentional security threat that is a type of Trojan program used to release a virus, worm, or other destructive code.  
🗑
show _____ encryption is also known as secret key encryption.  
🗑
show A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.  
🗑
transport   show
🗑
Protocol   show
🗑
speed of its interconnections   show
🗑
show _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.  
🗑
show Identify a true statement about convergence in data communication.  
🗑
show A hierarchical topology is also called a _____ topology.  
🗑
Hierarchical topology   show
🗑
Network layer   show
🗑
packet   show
🗑
nodes on a network   show
🗑
Transport layer   show
🗑
show A(n) _____ is a network connection device, which can build tables that identify addresses on each network.  
🗑
show In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.  
🗑
It ensures a tight control over system operations and applications.   show
🗑
multiplexer   show
🗑
conducted   show
🗑
show The _____ layer of the Open Systems Interconnection (OSI) model serves as the window through which computer programs access network services.  
🗑
Terrestrial microwave   show
🗑
WPA2 (Wi-Fi Protected Access 2)   show
🗑
integrate services to a single building or campus   show
🗑
show Identify a true statement about distributed processing.  
🗑
show A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers.  
🗑
show In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.  
🗑
The user creates a query by running client software.   show
🗑
show Which of the following statements is true of Web applications?  
🗑
Cascading Style Sheets (CSS)   show
🗑
Social networking   show
🗑
show The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth.  
🗑
show DNS (Domain Name System) servers translate all domain names into _____.  
🗑
fiber-optic   show
🗑
show A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.  
🗑
show Housed at server farms, search engines use _____ to index data coming in from crawlers.  
🗑
Internet telephony   show
🗑
show Which of the following protocols is used to send e-mails?  
🗑
show A(n) _________ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so communication between organizations is possible.  
🗑
Community TLDs are limited to members of a defined community.   show
🗑
client-based   show
🗑
show Which of the following statements is true of Extensible Markup Language (XML)?  
🗑
E-collaboration   show
🗑
Internet Relay Chat (IRC)   show
🗑
Pinterest   show
🗑
show The embedded references in hypermedia documents are called _________.​  
🗑
Podcasts   show
🗑
show _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.  
🗑
show In the context of an organization, which of the following statements is true of an intranet?  
🗑
hypermedia   show
🗑
.net   show
🗑
show Which of the following is a serious problem with wikis?  
🗑
podcast   show
🗑
search engines   show
🗑
Community TLDs are limited to members of a defined community.   show
🗑
show Intranets are also called _____.  
🗑
show _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.  
🗑
Asymmetric DSL (ADSL)   show
🗑
show A(n) _____ is the address of a document or site on the Internet.  
🗑
local area network (LAN)   show
🗑
Internet Protocol (IP) addresses   show
🗑
show _________ is a service that uses the Internet rather than the network to exchange spoken conversations.  
🗑
Discussion groups   show
🗑
show In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________.​  
🗑
Crawlers   show
🗑
It is used to create Web pages.   show
🗑
An intranet is different from a local area network (LAN), although it uses the same physical connections.   show
🗑
show _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time.  
🗑
show A _____ is an information system that enables users to retrieve data from the Web by using keywords.  
🗑
Web 3.0   show
🗑
client-based   show
🗑
show Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.  
🗑
podcast   show
🗑
Internet backbone   show
🗑
Accuracy of information   show
🗑
An extranet   show
🗑
teleimmersion system   show
🗑
show In the URL _____ represents the name of the directory in which files are stored.  
🗑
show Service and support are even more important in e-commerce than in traditional commerce because e-commerce companies _____.  
🗑
show A(n) _____ refers to exchange of money or scrip electronically.  
🗑
splash screen   show
🗑
show In Web marketing, identify the technology in which information is sent to users based on their previous inquiries, interests, or specifications.  
🗑
Wireless Application Protocol   show
🗑
show Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks.  
🗑
They are supported by short-range wireless communication technologies.   show
🗑
E-business   show
🗑
show The _____ represents the value added by supporting primary activities of a value chain.  
🗑
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit.   show
🗑
hit   show
🗑
show Which of the following is an advantage of e-commerce?  
🗑
Price transparency   show
🗑
show E-commerce fulfills the product information activity using _____.  
🗑
Brokerage model   show
🗑
show In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML).  
🗑
buyer-side marketplace   show
🗑
Search engine optimization   show
🗑
merchant model   show
🗑
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens.   show
🗑
show E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.  
🗑
show Identify a similarity between e-commerce and traditional commerce.  
🗑
E-procurement   show
🗑
show Crisis response is categorized as a _____ application.  
🗑
Third-party exchange marketplace   show
🗑
show The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.  
🗑
Information sharing   show
🗑
Improving customer service   show
🗑
show _____, in e-commerce, means all market participants can trade at the same price.  
🗑
show In a third-party exchange marketplace, the sale of medical products is an example of a(n) _____.  
🗑
show A Web page displayed when a user first visits a site is called a(n) _____.  
🗑
buyer-side marketplace   show
🗑
show Which of the following primary activities in a value chain involves processing raw materials into finished goods and services?  
🗑
show Identify a true statement about in-game mobile marketing.  
🗑
show Which of the following is true of mobile commerce (m-commerce) applications?  
🗑
horizontal   show
🗑
Search engine optimization   show
🗑
business-to-business (B2B)   show
🗑
E-procurement   show
🗑
​infomediary model   show
🗑
show Crisis response is categorized as a _____ application.  
🗑
show Any element of a Web page that is clicked counts as a _____ to a server.  
🗑
show In the _____, an organization uses e-commerce sites to sell digital products and services.  
🗑
The goal of selling products to generate profit is the same.   show
🗑
show E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.  
🗑
ebXML allows you to select only the data requested in a search.   show
🗑
show Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.  
🗑
smart card   show
🗑
show Identify a true statement about cookies.  
🗑
show Which of the following is a supporting activity in a value chain?  
🗑
show The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain.  
🗑
Tactical   show
🗑
MNCs deliver products and services across national borders.   show
🗑
data security   show
🗑
The usage on a global scale is more challenging than doing so on a local scale.   show
🗑
Improved telecommunication systems   show
🗑
show The _____ factor involves how immune a communication medium is to outside electronic interference.  
🗑
show Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.  
🗑
integrated   show
🗑
severe shortage   show
🗑
show By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.  
🗑
transnational   show
🗑
can increase its control over its subsidiaries   show
🗑
show _____ support of a global information system (GIS) involves broad and long-term goals.  
🗑
Operational   show
🗑
Management of global tax risk   show
🗑
production and marketing   show
🗑
show With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.  
🗑
show A manufacturer moving operations to another country because of advantages available in that country is involved in _____ the operations.  
🗑
defined behaviors for different processes   show
🗑
standardization within departments   show
🗑
cheap labor   show
🗑
show A global network must have _____ to guide packets to their destinations.  
🗑
show One of the issues with a global information system (GIS) is that too much _____ can decrease an organization’s flexibility in responding to local preferences and even time differences.  
🗑
show In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different specialized parts of an organization.  
🗑
planning phase   show
🗑
Economic feasibility   show
🗑
show Which of the following is an advantage of a joint application design (JAD)?  
🗑
show Identify a key feature of extreme programming (XP).  
🗑
A lengthy time frame makes a request for proposal less appealing.   show
🗑
show During the implementation phase of the systems development life cycle (SDLC), in _____, the analyst introduces an information system in only a limited area of an organization, such as a division or department.  
🗑
are its customers, contractors, and suppliers   show
🗑
show Identify a true statement of extreme programming.  
🗑
show Identify a similarity between agile methodology and extreme programming (XP).  
🗑
a narrow focus, which might limit future development   show
🗑
show Which of the following increases the risk of leaking confidential information to competitors?  
🗑
show In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.  
🗑
show During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.  
🗑
show Identify a true statement about pair programming.  
🗑
Internal users   show
🗑
The technique works by determining the critical path for interrelated activities with zero slack time.   show
🗑
Management voicing concern about the organization’s lack of a competitive edge in the marketplace   show
🗑
show Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).  
🗑
Operational feasibility   show
🗑
flowchart   show
🗑
show _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.  
🗑
show _____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished.  
🗑
internal rate of return   show
🗑
show Which of the following is a characteristic of a joint application design (JAD)?  
🗑
design phase   show
🗑
e-business   show
🗑
show A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS).  
🗑
transnational   show
🗑
show Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.  
🗑
show One of the dimensions along which a global information system (GIS) is defined is _____, which refers to the use of managerial power to ensure adherence to an organization’s goals.  
🗑
management   show
🗑
show If a company uses multimedia applications in addition to normal file and database sharing, _____ transmission is more efficient.  
🗑
The Internet   show
🗑
globalization   show
🗑
show Initially, offshore outsourcing was used mostly in manufacturing to find _____.  
🗑
show Which of the following statements is true of a global information system (GIS)?  
🗑
show With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.  
🗑
show Which of the following statements is true of multinational corporations (MNCs)?  
🗑
switching nodes   show
🗑
show _____ support of a global information system (GIS) involves broad and long-term goals.  
🗑
can increase its control over its subsidiaries   show
🗑
decentralized   show
🗑
multinational   show
🗑
show Control in a global information system (GIS) requires _____.  
🗑
show Which of the following is true of information systems?  
🗑
show Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.  
🗑
show One of the issues with the _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.  
🗑
Operational   show
🗑
show Which of the following statements is true of a global organization structure?  
🗑
different character sets used for the names of people and places   show
🗑
show The _____, which indicates the start of the design phase, is created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC).  
🗑
show Which of the following increases the risk of leaking confidential information to competitors?  
🗑
physical design   show
🗑
show With _____, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico.  
🗑
maintenance phase   show
🗑
Operational feasibility   show
🗑
show In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices.  
🗑
show A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.  
🗑
Rapid application development (RAD)   show
🗑
onshore outsourcing   show
🗑
Immediate feedback from users   show
🗑
show One shortcoming of rapid application development (RAD) is _____.  
🗑
show _____ helps reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs.  
🗑
show Identify a similarity between agile methodology and extreme programming (XP).  
🗑
planning phase   show
🗑
A lengthy time frame makes a request for proposal less appealing.   show
🗑
show Identify a difference between the systems development life cycle (SDLC) and extreme programming (XP).  
🗑
waterfall model   show
🗑
proof-of-concept prototype   show
🗑
show Identify a true statement of the Critical Path Method (CPM).  
🗑
show Identify a true statement of extreme programming.  
🗑
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application.   show
🗑
planning phase   show
🗑
show Which of the following is an internally identified problem in information systems?  
🗑
logical design   show
🗑
show Which of the following statements is true of an e-distributor?  
🗑
show In manufacturing, identify one of the major links in the supply chain.  
🗑
show The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external data and information needed by other functions.  
🗑
Personalization   show
🗑
manufacturers   show
🗑
brokerage   show
🗑
Distribution centers   show
🗑
show In the context of e-marketplaces, a company can purchase a(n) _____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers.  
🗑
An enterprise system is an application used in all the functions of a business.   show
🗑
show Which of the following is a disadvantage of an enterprise resource planning (ERP) system?  
🗑
Financial reporting   show
🗑
show Which of the following helps businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock?  
🗑
inventory management   show
🗑
Traditional EDI is more beneficial when there are more companies in the EDI network.   show
🗑
show In supply chain management (SCM), which of the following is substituted by companies for printing, mailing, and faxing paper documents?  
🗑
online auction   show
🗑
“Web-based” EDI reduces the cost of transmitting documents with the help of the Internet.   show
🗑
Knowledge management (KM)   show
🗑
show In a manufacturing firm’s supply chain management (SCM) system, which flow oversees order transmission?  
🗑
show In a manufacturing firm’s supply chain management (SCM) system, which flow handles credit terms and payment schedules?  
🗑
purchasing/procurement   show
🗑
It improves operational efficiency and manages inventory.   show
🗑
show In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers’ buying patterns?  
🗑
show Which of the following statements is true of online auctions?  
🗑
show Which of the following systems’ goal is to improve services offered to consumers and use consumer contact information for targeted marketing?  
🗑
Reduction in stress levels   show
🗑
The decision maker’s intuition plays a major role in one-time decisions.   show
🗑
show In the decision support system (DSS) environment, a _____ focuses on how the DSS is implemented and usually addresses questions about data storage, file structure, user access, response time, and security measures.  
🗑
Semistructured   show
🗑
semistructured   show
🗑
show For a(n) _____ to be useful, it should collect data related to an organization’s critical success factors—issues that make or break a business.  
🗑
show According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)?  
🗑
show _____ is a collection of applications that supports decision makers by providing access to a shared environment and information.  
🗑
Points   show
🗑
Intelligent agents   show
🗑
show Research and development is an example of a(n) _____ decision.  
🗑
unstructured   show
🗑
show In which of the following areas is a semistructured decision often used?  
🗑
show A GIS with analytical capabilities evaluates the impact of decisions by interpreting _____.  
🗑
show Which of the following tasks performed by managers uses an executive information system (EIS)?  
🗑
show Identify a disadvantage of group support systems (GSSs)?  
🗑
show In the _____ of the decision-making process, data is collected from internal and external sources and processed.  
🗑
show Setting queue priorities is a type of _____ decision at the operational management level.  
🗑
show _____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations.  
🗑
show Identify a task performed by a geographic information system (GIS).  
🗑
Electronic meeting systems   show
🗑
Introducing a new product   show
🗑
Structured   show
🗑
geographic information system (GIS)   show
🗑
Desktop conferencing enables participants to have multiple video windows open at one time.   show
🗑
DENDRAL   show
🗑
expert system   show
🗑
Inference engine   show
🗑
Monitoring and surveillance   show
🗑
show _____ agents can serve as search engines, site reminders, or personal surfing assistants.  
🗑
show Which of the following is true of integrating an expert system into the database component of a DSS?  
🗑
knowledge acquisition facility   show
🗑
Meta-knowledge   show
🗑
show In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.  
🗑
show In forward chaining technique used by the inference engine component of an expert system, the _____ condition is evaluated first.  
🗑
show Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input.  
🗑
personal   show
🗑
inference engine   show
🗑
show Hewlett-Packard uses _____ reasoning to assist users of its printers.  
🗑
show The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.  
🗑
artificial neural network   show
🗑
show _____ was developed so that users could communicate with computers in human language.  
🗑
show The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention.  
🗑
bots   show
🗑
show _____ is an example of an expert system that can be applied to various financial applications.  
🗑
Genetic algorithms   show
🗑
show Adding deductive reasoning to traditional DBMS functions is a benefit of integrating an expert system into the database component of a(n) _____.  
🗑
Fuzzy logic   show
🗑
show _____ systems have been one of the most successful artificial intelligence (AI)-related technologies.  
🗑
show Which of the following statements is true of personal robots?  
🗑
hybrid   show
🗑
Software as a service   show
🗑
Central coordinating processor and software system   show
🗑
Biometric   show
🗑
virtual world   show
🗑
show _____ radio frequency identification (RFID) tags have no internal power supply.  
🗑
show In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.  
🗑
show Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.  
🗑
show GuardIT,security company, work w companies2obtain intel property&protect em.deals w secure data4variety of software&e-commerce agreements,TM&patent licenses.cloud comput optn wld b most suitable?  
🗑
cave automatic virtual environment (CAVE)   show
🗑
nanoscale   show
🗑
Regulatory compliance   show
🗑
Cloud computing   show
🗑
Data segregation   show
🗑
community   show
🗑
scanner   show
🗑
show _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.  
🗑
show VT offer cloud comput serv to several data centers in the world.provide comp infrastructure - servers, networking elements, and SaaS.own the equipment&are liable for housing,functioning,&maintaining it.type of cloud comput model VT delivers as a service?  
🗑
networked communication   show
🗑
Platform as a service (PaaS)   show
🗑
push   show
🗑
show According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.  
🗑
Biometrics   show
🗑
metropolitan area networks   show
🗑
push   show
🗑
show In the artificial intelligence (AI) field, _____ engineers try to discover “rules of thumb” that enable computers to perform tasks usually handled by humans.  
🗑
show _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.  
🗑
show _____ networks are networks that learn and are capable of performing tasks that are difficult with conventional computers.  
🗑
show The knowledge base component of an expert system must include _____, which consists of rules related to a problem or discipline.  
🗑
case-based   show
🗑
Autonomy   show
🗑
then   show
🗑
show _____ was developed so that users could communicate with computers in human language.  
🗑
Variable Assembly Language (VAL)   show
🗑
heuristics   show
🗑
bots   show
🗑
show Which of the following statements is true of personal robots?  
🗑
Inference engine   show
🗑
show Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.  
🗑
show In design and implementation of any _____ reasoning application there are 4 Rs involved.  
🗑
show In the context of integrating artificial intelligence technologies into a decision support system’s model base component, _____ can be added to include heuristics in the model base’s analysis capabilities.  
🗑
Humanlike interface   show
🗑
show The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.  
🗑
knowledge acquisition facility   show
🗑
robots   show
🗑
show Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.  
🗑
show Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____  
🗑
show Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.  
🗑
show In the context of the decision-making analyses that use information technology, _____ analysis is available in spreadsheet programs such as Microsoft Excel.  
🗑
show An NLP system provides a question-and-answer setting that is particularly useful with _____.  
🗑
Expert   show
🗑
show _____ could be useful for authentication purposes in voting via the Internet.  
🗑
show Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?  
🗑
personal area network (PAN)   show
🗑
show Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.  
🗑
show _____ means enabling users to act on objects in a virtual reality (VR) environment, such as using a data glove to pick up and move objects.  
🗑
it does not guarantee that an application will fully meet an organization’s needs   show
🗑
show The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.  
🗑
push   show
🗑
show In order to read a QR (quick response) code using a smartphone, one must have the _____ app.  
🗑
hybrid   show
🗑
radio frequency identification tag   show
🗑
quick response code   show
🗑
show _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.  
🗑
show According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.  
🗑
show In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location.  
🗑
software as a service (SaaS)   show
🗑
public   show
🗑
Biometric   show
🗑
show _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0.  
🗑
metropolitan area networks   show
🗑
show WPis in the process of shifting its list of inven2cloud4easier access among its diff branches.company trying to find a cloud comput optn that offers highest cost saving&requires least amt of involv by IT mngrs.Wich cloud computing optn wld b the best4WP?  
🗑
show With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.  
🗑
data segregation   show
🗑
ASPs ensure that software is kept up to date, based on users’ requests.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: pace_sauce
Popular Business sets