CIS Exam 1
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | Which of the following strategies was identified by Michael Porter to successfully compete in the marketplace?
🗑
|
||||
show | Identify the output of an information system.
🗑
|
||||
providing information in a useful format for decision-making purposes | show 🗑
|
||||
supplier | show 🗑
|
||||
differentiation strategy | show 🗑
|
||||
show | In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.
🗑
|
||||
show | Identify the true statement about transaction-processing systems
🗑
|
||||
show | Identify the component of an information system that consists of facts analyzed by the process component.
🗑
|
||||
show | The _________ component of an information system is considered the input to the system.
🗑
|
||||
it allocates human and financial resources | show 🗑
|
||||
selecting the best modes of transportation | show 🗑
|
||||
show | Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?
🗑
|
||||
show | To be useful, information must have the quality of _____.
🗑
|
||||
providing an inexpensive medium for targeting a large customer base | show 🗑
|
||||
show | Why do information systems use graphical user interfaces (GUIs)?
🗑
|
||||
marketing information systems (MKIS) | show 🗑
|
||||
show | Which of the following is one of the forces of the Five Forces Model identified by Michael Porter?
🗑
|
||||
It is a network within an organization that uses Internet protocols and technologies. | show 🗑
|
||||
It focuses on generating new revenue by offering new products and services. | show 🗑
|
||||
show | Identify the true statement about the data component of an information system.
🗑
|
||||
labor statistics | show 🗑
|
||||
produce information in different formats | show 🗑
|
||||
database administrator | show 🗑
|
||||
show | Identify the term that provides historical and predictive views of business operations.
🗑
|
||||
show | _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
🗑
|
||||
show | A(n) _____ is a communication interface through which information is transferred one bit at a time.
🗑
|
||||
show | A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
🗑
|
||||
show | Identify the drawback of silicon because of which computer designers concentrate on technologies that use gallium arsenide.
🗑
|
||||
kernel | show 🗑
|
||||
The contents of programmable read-only memory cannot be reprogrammed. | show 🗑
|
||||
show | A _____ is the size of a character.
🗑
|
||||
show | An employee prints a document from his computer through a printer placed in a different location of the same network. Which of the following allows the employee to connect to network resources?
🗑
|
||||
computer-aided design | show 🗑
|
||||
random access memory (RAM) | show 🗑
|
||||
show | A _____ is a link between devices connected to a computer.
🗑
|
||||
show | Identify a computer language that is machine dependent.
🗑
|
||||
cloud | show 🗑
|
||||
microsoft windows | show 🗑
|
||||
show | _____ computer languages are machine independent and are called high-level languages.
🗑
|
||||
show | A _____ is a peripheral device for recording, storing, and retrieving information.
🗑
|
||||
show | Which of the following statements is true of inkjet printers?
🗑
|
||||
128 | show 🗑
|
||||
show | _____ means saving data in computer memory.
🗑
|
||||
high-level | show 🗑
|
||||
show | Identify a true statement about laser printers.
🗑
|
||||
liquid crystal display | show 🗑
|
||||
256 | show 🗑
|
||||
redundant array of independent disks | show 🗑
|
||||
show | Third-generation computers introduced _____.
🗑
|
||||
It is a set of programs for controlling and managing computer hardware and software | show 🗑
|
||||
it focuses on improving efficiency by reducing overall costs | show 🗑
|
||||
show | Identify how information systems help an organization.
🗑
|
||||
It focuses on generating new revenue by offering new products and services. | show 🗑
|
||||
show | _____ is high when customers have many choices and low when they have few choices.
🗑
|
||||
chief technology officer | show 🗑
|
||||
information literacy | show 🗑
|
||||
commercial programs | show 🗑
|
||||
show | Identify a true statement about database management systems.
🗑
|
||||
Aggregated data enables decision makers to focus on specific factors. | show 🗑
|
||||
network administrator | show 🗑
|
||||
show | The _________ component of an information system is considered the input to the system.
🗑
|
||||
show | _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
🗑
|
||||
supplier | show 🗑
|
||||
computer literacy | show 🗑
|
||||
information | show 🗑
|
||||
show | The purpose of an information system’s _____ component is generating the most useful type of information for making decisions.
🗑
|
||||
show | Widespread applications and deployment of devices that know users, their devices, and their locations and serve as intelligent assistants to businesses and individuals is known as _____.
🗑
|
||||
show | Which of the following decisions is supported by a logistics information system (LIS)?
🗑
|
||||
show | Microsoft Access, which is used to create and manage a series of integrated files, is a(n) _____.
🗑
|
||||
show | Identify the term that provides historical and predictive views of business operations.
🗑
|
||||
show | UNIX is a type of _____.
🗑
|
||||
data codes | show 🗑
|
||||
show | A _____ is a pointing device that moves the cursor on the screen, allowing fast, precise cursor positioning.
🗑
|
||||
show | _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.
🗑
|
||||
show | _____ computer languages are machine independent and are called high-level languages.
🗑
|
||||
program | show 🗑
|
||||
random access memory (RAM) | show 🗑
|
||||
show | identify a true statement about memory devices
🗑
|
||||
show | Identify an input device used to grade multiple-choice and true/false tests.
🗑
|
||||
ROM is nonvolatile memory, whereas RAM is volatile memory. | show 🗑
|
||||
show | The word computer consists of 64 bits, which is equivalent to _____ bytes.
🗑
|
||||
show | Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
🗑
|
||||
show | A write once, read many (WORM) disc is a common type of _____.
🗑
|
||||
show | Identify the file in which each alphabetic, numeric, or special character is represented with a 7-bit binary number.
🗑
|
||||
vacuum tube technology | show 🗑
|
||||
show | Third-generation computers introduced _____.
🗑
|
||||
show | A _____ allows data to be stored in multiple places to improve a system’s reliability.
🗑
|
||||
occupy less space than a mouse | show 🗑
|
||||
database engine | show 🗑
|
||||
it uses more sophisticated security measures | show 🗑
|
||||
external and internal | show 🗑
|
||||
indexed sequential access method | show 🗑
|
||||
show | In data warehouses, _____ is information in its original form.
🗑
|
||||
show | The _____ operator, discussed in data manipulation, is used when all the conditions in a query by example (QBE) form are required to be met
🗑
|
||||
store multidimensional data | show 🗑
|
||||
show | A data _____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
🗑
|
||||
data mining tools | show 🗑
|
||||
show | In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.
🗑
|
||||
data mart | show 🗑
|
||||
show | In the context of data administration component, the acronym CRUD stands for _____.
🗑
|
||||
mobile and wireless technology | show 🗑
|
||||
attributes | show 🗑
|
||||
operations | show 🗑
|
||||
enterprise resource planning systems | show 🗑
|
||||
show | To begin designing a relational database, one must define the _____ by defining each table and the fields in it.
🗑
|
||||
developing recovery procedures in case data is lost or corrupted | show 🗑
|
||||
allocation | show 🗑
|
||||
show | _____, a component of a data model, defines the boundaries of a database, such as maximum and minimum values allowed for a field.
🗑
|
||||
summary data | show 🗑
|
||||
show | In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.
🗑
|
||||
metadata | show 🗑
|
||||
show | The data _____ component of a database management system (DBMS) is used for tasks such as backup and recovery, security, and change management.
🗑
|
||||
data definition | show 🗑
|
||||
show | Whenever a user accesses the same domain, the browser sends saved information to the _________.
🗑
|
||||
They let independent customers share skills and have access to each other’s markets via information technologies. | show 🗑
|
||||
show | In the context of Web and network privacy, _____ is a method for binding all the parties to a contract.
🗑
|
||||
show | _____ is registering, selling, or using a domain name to profit from someone else’s trademark.
🗑
|
||||
show | In the context of Web and network privacy, _____ refers to issues involving both the user’s and the organization’s responsibilities and liabilities.
🗑
|
||||
trademark | show 🗑
|
||||
industrial | show 🗑
|
||||
spam | show 🗑
|
||||
show | The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
🗑
|
||||
show | Identify a true statement about copyrights.
🗑
|
||||
show | The _____ was partially overturned in the 1997 Reno v. ACLU case, in which the U.S. Supreme Court unanimously voted to strike down the act’s anti-indecency provisions, finding they violated the freedom of speech provisions of the First Amendment.
🗑
|
||||
reduces employee turnover | show 🗑
|
||||
show | Which of the following is a commonly used technology for data collection?
🗑
|
||||
By using video conferencing, electronic meeting systems, and groupware | show 🗑
|
||||
show | Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
🗑
|
||||
show | Which of the following is a benefit of using patents in organizations?
🗑
|
||||
URL hijacking | show 🗑
|
||||
copyright | show 🗑
|
||||
show | Identify a true statement about information technology in social divisions.
🗑
|
||||
legal and ethical | show 🗑
|
||||
show | In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.
🗑
|
||||
show | Which of the following statements is true of virtual organizations?
🗑
|
||||
when experienced labor is eliminated by high technology | show 🗑
|
||||
skills are shared among participating companies of a virtual organization | show 🗑
|
||||
show | _________ is computing that promotes a sustainable environment and consumes the least amount of energy.
🗑
|
||||
show | In the context of security threats, _________ means using “people skills”—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information.
🗑
|
||||
signature analysis | show 🗑
|
||||
pharming | show 🗑
|
||||
show | _____ is a commonly used encryption protocol that manages transmission security on the Internet.
🗑
|
||||
show | A level 1 security system is used to protect _____ against unauthorized access.
🗑
|
||||
show | _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.
🗑
|
||||
Trojan programs | show 🗑
|
||||
show | To ensure confidentiality, accuracy, and integrity of data, a level 2 security system protects _____.
🗑
|
||||
show | A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
🗑
|
||||
show | _____ is the process of capturing and recording network traffic.
🗑
|
||||
show | _________ is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
🗑
|
||||
show | In nonbiometric security measure, a _____ is a software that acts as an intermediary between two systems.
🗑
|
||||
show | Which of the following is a nonbiometric security measure?
🗑
|
||||
symmetric | show 🗑
|
||||
show | when does spoofing occur?
🗑
|
||||
show | identify a true statement about firewalls
🗑
|
||||
show | Identify a security measure that uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.
🗑
|
||||
show | _____ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
🗑
|
||||
show | _____ outlines procedures for keeping an organization operational in the event of a natural disaster or a network attack or intrusion.
🗑
|
||||
show | When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.
🗑
|
||||
It is an independent program that can spread itself without attaching itself to a host program. | show 🗑
|
||||
show | In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
🗑
|
||||
show | Which of the following is true of phishing?
🗑
|
||||
spyware | show 🗑
|
||||
worm | show 🗑
|
||||
show | In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
🗑
|
||||
show | In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
🗑
|
||||
radiated | show 🗑
|
||||
hierarchical topology | show 🗑
|
||||
show | A(n) _____ cable is used to connect computers, hubs, switches, and routers to a network
🗑
|
||||
show | Transmission of data across satellites is through _____.
🗑
|
||||
show | In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the entire network.
🗑
|
||||
digital subscriber line (DSL) | show 🗑
|
||||
protocol | show 🗑
|
||||
show | Local area networks (LANs) are used to _____.
🗑
|
||||
It requires major network upgrades, because video requires much more bandwidth. | show 🗑
|
||||
network layer | show 🗑
|
||||
speed of its interconnections | show 🗑
|
||||
bandwidth | show 🗑
|
||||
show | _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.
🗑
|
||||
show | A routing table lists _____.
🗑
|
||||
Asynchronous Transfer Mode (ATM) | show 🗑
|
||||
show | Identify a layer of the Open Systems Interconnection (OSI) model that provides methods for controlling data flow, ordering received data, and acknowledging received data.
🗑
|
||||
show | A _____ is a hardware device that allows several nodes to share one communication channel.
🗑
|
||||
WPA (Wi-Fi Protected Access) | show 🗑
|
||||
tree | show 🗑
|
||||
adding more workstations | show 🗑
|
||||
An n-tier architecture helps improve network performance | show 🗑
|
||||
it handles steady traffic well | show 🗑
|
||||
internet protocol (IP) | show 🗑
|
||||
Assymetric DSL (ADSL) | show 🗑
|
||||
/˜hbidgoli | show 🗑
|
||||
show | Which of the following statements is true of Extensible Markup Language (XML)?
🗑
|
||||
hyphens | show 🗑
|
||||
gigapop | show 🗑
|
||||
show | DNS (Domain Name System) servers translate all domain names into _____.
🗑
|
||||
show | _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.
🗑
|
||||
show | The goal of _____ is to tailor online searching and requests to users’ specific search patterns, preferences, and needs.
🗑
|
||||
server | show 🗑
|
||||
show | In the context of an organization, which of the following statements is true of an intranet?
🗑
|
||||
show | Which of the following statements is true of geographic top-level domains (TLDs)?
🗑
|
||||
crawlers | show 🗑
|
||||
blog | show 🗑
|
||||
show | Identify a true statement about Voice over Internet Protocol (VoIP).
🗑
|
||||
show | A(n) _____ is the address of a document or site on the Internet.
🗑
|
||||
hypermedia | show 🗑
|
||||
voice over internet protocol (VOIP) | show 🗑
|
||||
client-based | show 🗑
|
||||
show | Which of the following protocols is used to send e-mails?
🗑
|
||||
podcast | show 🗑
|
||||
show | _____ are unique identifiers of computer or network addresses on the Internet.
🗑
|
||||
show | Which of the following is a drawback of Internet telephony?
🗑
|
||||
instant messaging (IM) | show 🗑
|
||||
teleimmersion system | show 🗑
|
||||
show | Which of the following is also known as “the Semantic Web”?
🗑
|
||||
They focus on data collection and processing. | show 🗑
|
||||
show | Which of the following decisions is supported by a manufacturing information system (MFIS)?
🗑
|
||||
show | To be useful, information must have the quality of _____.
🗑
|
||||
It helps the organization reduce cost of products and services. | show 🗑
|
||||
show | In the context of the information technology (IT) jobs, in the information systems field, a _________ designs and maintains the organization’s Web site.
🗑
|
||||
Information literacy | show 🗑
|
||||
show | _____ is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software.
🗑
|
||||
show | To be competitive in a workplace, in terms of computer and information literacy, a knowledge worker should _____.
🗑
|
||||
show | Why do information systems use graphical user interfaces (GUIs)?
🗑
|
||||
show | Building and integrating analytics capabilities into all everyday business activities is known as _____.
🗑
|
||||
They can automate repetitive operations. | show 🗑
|
||||
show | Identify the output of an information system.
🗑
|
||||
supplier | show 🗑
|
||||
show | Identify the component of an information system that consists of facts analyzed by the process component.
🗑
|
||||
show | Which of the following strategies identified by Michael Porter helps organizations make their products and services distinct from their competitors?
🗑
|
||||
computer literacy | show 🗑
|
||||
show | Which of the following statements is true of data?
🗑
|
||||
short-message service | show 🗑
|
||||
produce information in different formats | show 🗑
|
||||
show | Which of the following decisions is supported by a financial information system (FIS)?
🗑
|
||||
show | In the context of information technology (IT) jobs, in the information systems field, a _________ is responsible for database design and implementation.
🗑
|
||||
show | _____ help a person connect with friends, family, and colleagues online and meet people with similar interests and hobbies.
🗑
|
||||
show | The top information systems job belongs to the _________.
🗑
|
||||
show | In the context of using information technology for a competitive advantage, identify a true statement about bottom-line strategy.
🗑
|
||||
show | _____ is a social networking Web site.
🗑
|
||||
Remote access servers | show 🗑
|
||||
optical storage | show 🗑
|
||||
show | A _____ is the size of a character
🗑
|
||||
show | Trackballs are ideal for notebook computers because they _____.
🗑
|
||||
Laser printers use toners to create high-quality output. | show 🗑
|
||||
show | Identify a true statement about memory devices.
🗑
|
||||
redundant array of independent disks | show 🗑
|
||||
show | Which of the following memory devices allows data to be read and written?
🗑
|
||||
liquid crystal display | show 🗑
|
||||
show | How is read-only memory (ROM) different from random access memory (RAM)?
🗑
|
||||
Silicon cannot emit light and has speed limitations. | show 🗑
|
||||
8 | show 🗑
|
||||
show | A(n) _____ is an interface between a computer and a printer that enables the computer to transfer multiple bits of information to the printer simultaneously.
🗑
|
||||
show | Which of the following statements is true of inkjet printers?
🗑
|
||||
show | An advantage of silicon over gallium arsenide is that _____.
🗑
|
||||
show | _____ computer languages are machine independent and are called high-level languages.
🗑
|
||||
It is a set of programs for controlling and managing computer hardware and software. | show 🗑
|
||||
show | Which of the following is the OS for most PCs and belongs to the system software group?
🗑
|
||||
show | Identify a true statement about the supervisor program.
🗑
|
||||
show | Identify a computer language that is machine dependent.
🗑
|
||||
mouse | show 🗑
|
||||
show | _____, which is nonvolatile, holds data when the computer is off or during the course of a program’s operation, and it is also used to store large volumes of data for long periods.
🗑
|
||||
show | Beginning in the 1940s, first-generation computers used _____.
🗑
|
||||
show | The supervisor program in an operating system (OS) is called the _____.
🗑
|
||||
random access memory (RAM) | show 🗑
|
||||
Despite being smaller, data marts can usually perform the same type of analysis as data warehouses. | show 🗑
|
||||
show | In a database, which of the following is a source of internal data?
🗑
|
||||
Mobile and wireless technology | show 🗑
|
||||
Enterprise resource planning systems | show 🗑
|
||||
structured data and unstructured data | show 🗑
|
||||
show | Which of the following factors has made big data analytics accessible to nearly all types of organizations?
🗑
|
||||
show | Identify the number of physical views of data for a database.
🗑
|
||||
attributes | show 🗑
|
||||
focuses on a specific area | show 🗑
|
||||
show | A(n) _____ is not limited by the data’s physical location.
🗑
|
||||
warehouse | show 🗑
|
||||
show | Data warehouses are sometimes called “hypercubes” because they _____.
🗑
|
||||
AND | show 🗑
|
||||
show | The _____ approach, used to set up a distributed database management system (DDBMS), combines fragmentation and replication.
🗑
|
||||
Tax records | show 🗑
|
||||
foreign | show 🗑
|
||||
show | In a(n) _____ model, nodes with the same parents are called siblings.
🗑
|
||||
extraction | show 🗑
|
||||
data model | show 🗑
|
||||
database engine | show 🗑
|
||||
data dictionary | show 🗑
|
||||
show | To begin designing a relational database, one must define the _____ by defining each table and the fields in it.
🗑
|
||||
show | In data warehouses, _____ is information about data—its content, quality, condition, origin, and other characteristics.
🗑
|
||||
Data in a flat file system may not be updated in all files consistently. | show 🗑
|
||||
show | Which of the following statements is true of big data?
🗑
|
||||
show | Identify a program used by parents to prevent their children’s access to certain Web sites.
🗑
|
||||
show | _____ information can be censored if the content is deemed offensive to a political, religious, or cultural group.
🗑
|
||||
smart | show 🗑
|
||||
The speed of the Internet connection also plays a role in digital divide discussion. | show 🗑
|
||||
patent | show 🗑
|
||||
typosquatting | show 🗑
|
||||
Products are customized more to respond to customers’ needs. | show 🗑
|
||||
By using video conferencing, electronic meeting systems, and groupware | show 🗑
|
||||
show | _____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
🗑
|
||||
show | In the context of privacy issues, in an organization, a new employees have to sign a(n) _________ before they access the network.
🗑
|
||||
Copyrights’ length vary based on the type of work. | show 🗑
|
||||
show | _____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
🗑
|
||||
show | Which of the following is true about virtual organizations?
🗑
|
||||
legal but unethical | show 🗑
|
||||
show | _____ can rise to an unmanageable level quickly, clogging users’ in-boxes and preventing access to legitimate e-mails.
🗑
|
||||
show | Which of the following principles states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
🗑
|
||||
show | In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of job _____.
🗑
|
||||
show | In the context of virtual organizations, the cost of hiring additional employees is reduced because _____.
🗑
|
||||
show | The 1980 revisions to the _____ of 1976 include computer programs, so both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs.
🗑
|
||||
show | Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the _____.
🗑
|
||||
use verification procedures to ensure data accuracy | show 🗑
|
||||
Cybersquatting | show 🗑
|
||||
show | Whenever a user accesses the same domain, the browser sends saved information to the _________.
🗑
|
||||
Communications Decency Act | show 🗑
|
||||
Organizations can use patents to keep competitors from entering certain market segments | show 🗑
|
||||
AND | show 🗑
|
||||
show | The _____ method is effective when a large number of records are processed less frequently, perhaps on a quarterly or yearly basis.
🗑
|
||||
show | The _____ component of a database management system (DBMS) is responsible for data storage, manipulation, and retrieval.
🗑
|
||||
warehouse | show 🗑
|
||||
show | Which of the following is an example of a source for external data?
🗑
|
||||
show | In a(n) _____ model, nodes with the same parents are called siblings.
🗑
|
||||
show | In a relational database model, the rows are known as _____.
🗑
|
||||
show | Which of the following components of a data model describes methods and calculations that can be performed on data, such as updating and querying data?
🗑
|
||||
data manipulation | show 🗑
|
||||
Indexed sequential access method | show 🗑
|
||||
data mining tools | show 🗑
|
||||
structured data and unstructured data | show 🗑
|
||||
show | In a relational database model, when a primary key for one table appears in another table, it is called a _____ key.
🗑
|
||||
network | show 🗑
|
||||
create, read, update, and delete | show 🗑
|
||||
It uses more sophisticated security measures. | show 🗑
|
||||
show | In contrast to data in a database, discussed in data warehouses, the subject-oriented characteristic _____.
🗑
|
||||
raw data | show 🗑
|
||||
show | Which of the following statements is true of data marts and data warehouses?
🗑
|
||||
show | Data warehouses are sometimes called “hypercubes” because they _____.
🗑
|
||||
show | In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria.
🗑
|
||||
Only one | show 🗑
|
||||
show | In a relational database model, a(n) _____ operation searches data in a table and retrieves records based on certain criteria.
🗑
|
||||
administration | show 🗑
|
||||
show | In data warehouses, _____ gives users subtotals of various categories, which can be useful.
🗑
|
||||
reduces employee turnover | show 🗑
|
||||
Copyrights’ length vary based on the type of work. | show 🗑
|
||||
Companies respond to customers faster and more efficiently. | show 🗑
|
||||
show | _____ is registering, selling, or using a domain name to profit from someone else’s trademark.
🗑
|
||||
Log files | show 🗑
|
||||
skills are shared among participating companies of a virtual organization | show 🗑
|
||||
show | Which of the following is a commonly used technology for data collection?
🗑
|
||||
Lack of necessary supplies or equipment | show 🗑
|
||||
not charge different rates on data | show 🗑
|
||||
CyberSitter | show 🗑
|
||||
show | Identify a true statement about information technology in social divisions.
🗑
|
||||
legal but unethical | show 🗑
|
||||
trademark | show 🗑
|
||||
reliability | show 🗑
|
||||
illegal and unethical | show 🗑
|
||||
show | In the context of ethical issues of information technologies, restricting access to the Web is a type of _____.
🗑
|
||||
show | In general, _____ last the author’s lifetime plus 70 years.
🗑
|
||||
Green computing | show 🗑
|
||||
They let independent customers share skills and have access to each other’s markets via information technologies | show 🗑
|
||||
cookies | show 🗑
|
||||
show | _________ organizations are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other’s markets.
🗑
|
||||
trademarks | show 🗑
|
||||
show | A common way to index and link databases is by using _________.
🗑
|
||||
needed for the stated purpose | show 🗑
|
||||
Copyright Act | show 🗑
|
||||
show | Identify a true statement about firewalls.
🗑
|
||||
show | _________ is the unauthorized use of computer data for personal gain, such as transferring money from another’s account or charging purchases to someone else’s account.
🗑
|
||||
show | What is Spyware?
🗑
|
||||
Passwords | show 🗑
|
||||
backdoor | show 🗑
|
||||
Asymmetric | show 🗑
|
||||
blended | show 🗑
|
||||
show | Which of the following is a biometric security measure?
🗑
|
||||
show | A level 3 security system focuses on protecting _____ against intrusion, denial-of-service attacks, and unauthorized access.
🗑
|
||||
integrity | show 🗑
|
||||
show | Which of the following forms of text used in an encryption algorithm is unreadable without a decryption key?
🗑
|
||||
blended threat | show 🗑
|
||||
show | _____ is a computer crime that involves destroying or disrupting computer services.
🗑
|
||||
social engineering | show 🗑
|
||||
show | In the context of computer and network security, _____ means that computers and networks are operating and authorized users can access the information they need.
🗑
|
||||
Asymmetric | show 🗑
|
||||
show | A level 1 security system is used to protect _____ against unauthorized access.
🗑
|
||||
Secure Sockets Layer | show 🗑
|
||||
show | In the context of security threats, a _____ floods a network or server with service requests to prevent legitimate users’ access to the system.
🗑
|
||||
show | _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
🗑
|
||||
It involves sending fraudulent e-mails that seem to come from legitimate sources. | show 🗑
|
||||
show | A(n) _________ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
🗑
|
||||
It occurs when an illegitimate program poses as a legitimate one. | show 🗑
|
||||
show | In _____ encryption, the same key is used to encrypt and decrypt a message.
🗑
|
||||
Adware | show 🗑
|
||||
speed of its interconnections | show 🗑
|
||||
show | In _____ processing, each department has its own computer for performing processing tasks.
🗑
|
||||
show | A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
🗑
|
||||
Digital subscriber line (DSL) | show 🗑
|
||||
show | In data communication, _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps.
🗑
|
||||
Coaxial cables | show 🗑
|
||||
show | Identify an advantage of centralized processing.
🗑
|
||||
Network layer | show 🗑
|
||||
show | A master key is obtained using which a user’s computer and access point (AP) negotiate for a key that will be used for a session and is discarded once the session is terminated. Which of the following techniques helps obtain this master key?
🗑
|
||||
transport | show 🗑
|
||||
show | Computers in a local area network (LAN) are usually connected to the network via a(n) _____, which is a hardware component.
🗑
|
||||
show | Identify an advantage of the bus topology.
🗑
|
||||
show | A _____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
🗑
|
||||
broadband | show 🗑
|
||||
It requires major network upgrades, because video requires much more bandwidth. | show 🗑
|
||||
show | A _________ works well for companies that are geographically dispersed.
🗑
|
||||
show | In the context of communication media, _________ media provide a physical path along which signals are transmitted, including twisted pair copper cable, coaxial cable, and fiber optics.
🗑
|
||||
show | Which of the following events takes place in the most basic client/server configuration?
🗑
|
||||
show | _____ cables have the highest bandwidth of any communication medium.
🗑
|
||||
WPA (Wi-Fi Protected Access) | show 🗑
|
||||
show | _____ cables are glass tubes surrounded by concentric layers of glass, called “cladding,” to form a light path through wire cables.
🗑
|
||||
show | Both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on the _________ as the communication medium.
🗑
|
||||
Open Systems Interconnection (OSI) | show 🗑
|
||||
radiated media | show 🗑
|
||||
show | The process of deciding which path data takes on a network is called _____.
🗑
|
||||
denial-of-service attack | show 🗑
|
||||
corporate networks | show 🗑
|
||||
show | Which of the following is considered an intentional security threat?
🗑
|
||||
show | Which of the following is true of phishing
🗑
|
||||
blended threat | show 🗑
|
||||
Ciphertext | show 🗑
|
||||
show | Which of the following indicates that a computer might be affected by a virus?
🗑
|
||||
Passwords | show 🗑
|
||||
Sabotage | show 🗑
|
||||
show | In _____ encryption, the same key is used to encrypt and decrypt a message.
🗑
|
||||
show | Identify a true statement about firewalls.
🗑
|
||||
show | A _____ travels from computer to computer in a network but it does not usually erase data.
🗑
|
||||
Computer fraud | show 🗑
|
||||
Spyware | show 🗑
|
||||
front-end servers | show 🗑
|
||||
show | In the context of security threats, a _____ is a programming routine built into a system by its designer or programmer.
🗑
|
||||
show | _____ security measures primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.
🗑
|
||||
show | When planning a comprehensive security system, the first step is designing _________, which use a combination of hardware and software for improving reliability—a way of ensuring availability in case of a system failure.
🗑
|
||||
show | Which of the following is true of a worm?
🗑
|
||||
show | The main function of Cyber Incident Response Capability (CIRC) is to _____.
🗑
|
||||
show | A(n) _____ is often used so remote users have a secure connection to an organization’s network.
🗑
|
||||
show | In the context of security threats, _____ takes advantage of the human element of security systems.
🗑
|
||||
show | The Committee on National Security Systems (CNSS) proposed another model for evaluating information security known as the _____.
🗑
|
||||
show | Identify an intentional security threat that is a type of Trojan program used to release a virus, worm, or other destructive code.
🗑
|
||||
show | _____ encryption is also known as secret key encryption.
🗑
|
||||
show | A(n) _________ processing system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers.
🗑
|
||||
transport | show 🗑
|
||||
Protocol | show 🗑
|
||||
speed of its interconnections | show 🗑
|
||||
show | _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
🗑
|
||||
show | Identify a true statement about convergence in data communication.
🗑
|
||||
show | A hierarchical topology is also called a _____ topology.
🗑
|
||||
Hierarchical topology | show 🗑
|
||||
Network layer | show 🗑
|
||||
packet | show 🗑
|
||||
nodes on a network | show 🗑
|
||||
Transport layer | show 🗑
|
||||
show | A(n) _____ is a network connection device, which can build tables that identify addresses on each network.
🗑
|
||||
show | In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
🗑
|
||||
It ensures a tight control over system operations and applications. | show 🗑
|
||||
multiplexer | show 🗑
|
||||
conducted | show 🗑
|
||||
show | The _____ layer of the Open Systems Interconnection (OSI) model serves as the window through which computer programs access network services.
🗑
|
||||
Terrestrial microwave | show 🗑
|
||||
WPA2 (Wi-Fi Protected Access 2) | show 🗑
|
||||
integrate services to a single building or campus | show 🗑
|
||||
show | Identify a true statement about distributed processing.
🗑
|
||||
show | A network interface card (NIC) operates at the Open Systems Interconnection (OSI) model’s _____ layers.
🗑
|
||||
show | In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.
🗑
|
||||
The user creates a query by running client software. | show 🗑
|
||||
show | Which of the following statements is true of Web applications?
🗑
|
||||
Cascading Style Sheets (CSS) | show 🗑
|
||||
Social networking | show 🗑
|
||||
show | The _________ is a foundation network linked with fiber-optic cables that can support very high bandwidth.
🗑
|
||||
show | DNS (Domain Name System) servers translate all domain names into _____.
🗑
|
||||
fiber-optic | show 🗑
|
||||
show | A _________ is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web.
🗑
|
||||
show | Housed at server farms, search engines use _____ to index data coming in from crawlers.
🗑
|
||||
Internet telephony | show 🗑
|
||||
show | Which of the following protocols is used to send e-mails?
🗑
|
||||
show | A(n) _________ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so communication between organizations is possible.
🗑
|
||||
Community TLDs are limited to members of a defined community. | show 🗑
|
||||
client-based | show 🗑
|
||||
show | Which of the following statements is true of Extensible Markup Language (XML)?
🗑
|
||||
E-collaboration | show 🗑
|
||||
Internet Relay Chat (IRC) | show 🗑
|
||||
show 🗑
|
|||||
show | The embedded references in hypermedia documents are called _________.
🗑
|
||||
Podcasts | show 🗑
|
||||
show | _____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
🗑
|
||||
show | In the context of an organization, which of the following statements is true of an intranet?
🗑
|
||||
hypermedia | show 🗑
|
||||
.net | show 🗑
|
||||
show | Which of the following is a serious problem with wikis?
🗑
|
||||
podcast | show 🗑
|
||||
search engines | show 🗑
|
||||
Community TLDs are limited to members of a defined community. | show 🗑
|
||||
show | Intranets are also called _____.
🗑
|
||||
show | _________ are indexes of information based on keywords embedded in documents that make it possible for search engines to find what Internet users are looking for.
🗑
|
||||
Asymmetric DSL (ADSL) | show 🗑
|
||||
show | A(n) _____ is the address of a document or site on the Internet.
🗑
|
||||
local area network (LAN) | show 🗑
|
||||
Internet Protocol (IP) addresses | show 🗑
|
||||
show | _________ is a service that uses the Internet rather than the network to exchange spoken conversations.
🗑
|
||||
Discussion groups | show 🗑
|
||||
show | In Really Simple Syndication (RSS), a subscription service, the layout and the appearance should be handled by _________.
🗑
|
||||
Crawlers | show 🗑
|
||||
It is used to create Web pages. | show 🗑
|
||||
An intranet is different from a local area network (LAN), although it uses the same physical connections. | show 🗑
|
||||
show | _________ is an Internet service that enables users in discussion rooms to exchange text messages with people in other locations in real time.
🗑
|
||||
show | A _____ is an information system that enables users to retrieve data from the Web by using keywords.
🗑
|
||||
Web 3.0 | show 🗑
|
||||
client-based | show 🗑
|
||||
show | Microsoft Internet Explorer (IE), Mozilla Firefox, Google Chrome, Apple Safari, and Opera are examples of _____.
🗑
|
||||
podcast | show 🗑
|
||||
Internet backbone | show 🗑
|
||||
Accuracy of information | show 🗑
|
||||
An extranet | show 🗑
|
||||
teleimmersion system | show 🗑
|
||||
show | In the URL _____ represents the name of the directory in which files are stored.
🗑
|
||||
show | Service and support are even more important in e-commerce than in traditional commerce because e-commerce companies _____.
🗑
|
||||
show | A(n) _____ refers to exchange of money or scrip electronically.
🗑
|
||||
splash screen | show 🗑
|
||||
show | In Web marketing, identify the technology in which information is sent to users based on their previous inquiries, interests, or specifications.
🗑
|
||||
Wireless Application Protocol | show 🗑
|
||||
show | Companies using _____ e-commerce applications for purchase orders, invoices, and other operations report millions of dollars in savings by increasing transaction speed, reducing errors, and eliminating manual tasks.
🗑
|
||||
They are supported by short-range wireless communication technologies. | show 🗑
|
||||
E-business | show 🗑
|
||||
show | The _____ represents the value added by supporting primary activities of a value chain.
🗑
|
||||
A cookie is the information a Web site stores on a user’s hard drive so it can be used for a later visit. | show 🗑
|
||||
hit | show 🗑
|
||||
show | Which of the following is an advantage of e-commerce?
🗑
|
||||
Price transparency | show 🗑
|
||||
show | E-commerce fulfills the product information activity using _____.
🗑
|
||||
Brokerage model | show 🗑
|
||||
show | In the context of trading partner agreements, identify an advantage of electronic business Extensible Markup Language (ebXML) over Hypertext Markup Language (HTML).
🗑
|
||||
buyer-side marketplace | show 🗑
|
||||
Search engine optimization | show 🗑
|
||||
merchant model | show 🗑
|
||||
This strategy uses mobile ads that appear within popular mobile games and can take several forms that appear between loading screens. | show 🗑
|
||||
show | E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.
🗑
|
||||
show | Identify a similarity between e-commerce and traditional commerce.
🗑
|
||||
E-procurement | show 🗑
|
||||
show | Crisis response is categorized as a _____ application.
🗑
|
||||
Third-party exchange marketplace | show 🗑
|
||||
show | The _____ transfers the old retail model to the e-commerce world by using the medium of the Internet.
🗑
|
||||
Information sharing | show 🗑
|
||||
Improving customer service | show 🗑
|
||||
show | _____, in e-commerce, means all market participants can trade at the same price.
🗑
|
||||
show | In a third-party exchange marketplace, the sale of medical products is an example of a(n) _____.
🗑
|
||||
show | A Web page displayed when a user first visits a site is called a(n) _____.
🗑
|
||||
buyer-side marketplace | show 🗑
|
||||
show | Which of the following primary activities in a value chain involves processing raw materials into finished goods and services?
🗑
|
||||
show | Identify a true statement about in-game mobile marketing.
🗑
|
||||
show | Which of the following is true of mobile commerce (m-commerce) applications?
🗑
|
||||
horizontal | show 🗑
|
||||
Search engine optimization | show 🗑
|
||||
business-to-business (B2B) | show 🗑
|
||||
E-procurement | show 🗑
|
||||
infomediary model | show 🗑
|
||||
show | Crisis response is categorized as a _____ application.
🗑
|
||||
show | Any element of a Web page that is clicked counts as a _____ to a server.
🗑
|
||||
show | In the _____, an organization uses e-commerce sites to sell digital products and services.
🗑
|
||||
The goal of selling products to generate profit is the same. | show 🗑
|
||||
show | E-commerce activities that take place within an organization’s network are part of the _____ e-commerce model.
🗑
|
||||
ebXML allows you to select only the data requested in a search. | show 🗑
|
||||
show | Identify the e-commerce business model that brings sellers and buyers together on the Web and collects commissions on transactions between these parties.
🗑
|
||||
smart card | show 🗑
|
||||
show | Identify a true statement about cookies.
🗑
|
||||
show | Which of the following is a supporting activity in a value chain?
🗑
|
||||
show | The growing trend toward universal customers and products means _____ has become an important factor in purchasing and the supply chain.
🗑
|
||||
Tactical | show 🗑
|
||||
MNCs deliver products and services across national borders. | show 🗑
|
||||
data security | show 🗑
|
||||
The usage on a global scale is more challenging than doing so on a local scale. | show 🗑
|
||||
Improved telecommunication systems | show 🗑
|
||||
show | The _____ factor involves how immune a communication medium is to outside electronic interference.
🗑
|
||||
show | Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.
🗑
|
||||
integrated | show 🗑
|
||||
severe shortage | show 🗑
|
||||
show | By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducting commercial activities.
🗑
|
||||
transnational | show 🗑
|
||||
can increase its control over its subsidiaries | show 🗑
|
||||
show | _____ support of a global information system (GIS) involves broad and long-term goals.
🗑
|
||||
Operational | show 🗑
|
||||
Management of global tax risk | show 🗑
|
||||
production and marketing | show 🗑
|
||||
show | With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.
🗑
|
||||
show | A manufacturer moving operations to another country because of advantages available in that country is involved in _____ the operations.
🗑
|
||||
defined behaviors for different processes | show 🗑
|
||||
standardization within departments | show 🗑
|
||||
cheap labor | show 🗑
|
||||
show | A global network must have _____ to guide packets to their destinations.
🗑
|
||||
show | One of the issues with a global information system (GIS) is that too much _____ can decrease an organization’s flexibility in responding to local preferences and even time differences.
🗑
|
||||
show | In the context of a global information system (GIS), _____ is the process of managing the interaction among activities in different specialized parts of an organization.
🗑
|
||||
planning phase | show 🗑
|
||||
Economic feasibility | show 🗑
|
||||
show | Which of the following is an advantage of a joint application design (JAD)?
🗑
|
||||
show | Identify a key feature of extreme programming (XP).
🗑
|
||||
A lengthy time frame makes a request for proposal less appealing. | show 🗑
|
||||
show | During the implementation phase of the systems development life cycle (SDLC), in _____, the analyst introduces an information system in only a limited area of an organization, such as a division or department.
🗑
|
||||
are its customers, contractors, and suppliers | show 🗑
|
||||
show | Identify a true statement of extreme programming.
🗑
|
||||
show | Identify a similarity between agile methodology and extreme programming (XP).
🗑
|
||||
a narrow focus, which might limit future development | show 🗑
|
||||
show | Which of the following increases the risk of leaking confidential information to competitors?
🗑
|
||||
show | In the _____ of the systems development life cycle (SDLC), a problem is defined and alternatives are generated for solving it.
🗑
|
||||
show | During the design phase of the systems development life cycle (SDLC), the _____ is created for a specific platform, such as choosing Dell servers running Ubuntu Linux and Java for the programming language.
🗑
|
||||
show | Identify a true statement about pair programming.
🗑
|
||||
Internal users | show 🗑
|
||||
The technique works by determining the critical path for interrelated activities with zero slack time. | show 🗑
|
||||
Management voicing concern about the organization’s lack of a competitive edge in the marketplace | show 🗑
|
||||
show | Computer-aided systems engineering (CASE) tools are typically used during the _____ of the systems development life cycle (SDLC).
🗑
|
||||
Operational feasibility | show 🗑
|
||||
flowchart | show 🗑
|
||||
show | _____ is a philosophy and a software and system development methodology that focuses on the development, use, and reuse of small, self-contained blocks of codes to meet the software needs of an organization.
🗑
|
||||
show | _____ is a method for developing software applications and information system projects in which a project is divided into smaller functions and developers cannot go on to the next phase until the current phase is finished.
🗑
|
||||
internal rate of return | show 🗑
|
||||
show | Which of the following is a characteristic of a joint application design (JAD)?
🗑
|
||||
design phase | show 🗑
|
||||
e-business | show 🗑
|
||||
show | A(n) _____ network for global control over an organization’s resources is the foundation of any global information system (GIS).
🗑
|
||||
transnational | show 🗑
|
||||
show | Considering an entire organization’s operational efficiency is critical in coordinating international business activities, so global companies need to change their _____ strategies in an effort to respond to the global market.
🗑
|
||||
show | One of the dimensions along which a global information system (GIS) is defined is _____, which refers to the use of managerial power to ensure adherence to an organization’s goals.
🗑
|
||||
management | show 🗑
|
||||
show | If a company uses multimedia applications in addition to normal file and database sharing, _____ transmission is more efficient.
🗑
|
||||
The Internet | show 🗑
|
||||
globalization | show 🗑
|
||||
show | Initially, offshore outsourcing was used mostly in manufacturing to find _____.
🗑
|
||||
show | Which of the following statements is true of a global information system (GIS)?
🗑
|
||||
show | With _____ transmission, both parties in a global network are connected at the same time, as in a phone call.
🗑
|
||||
show | Which of the following statements is true of multinational corporations (MNCs)?
🗑
|
||||
switching nodes | show 🗑
|
||||
show | _____ support of a global information system (GIS) involves broad and long-term goals.
🗑
|
||||
can increase its control over its subsidiaries | show 🗑
|
||||
decentralized | show 🗑
|
||||
multinational | show 🗑
|
||||
show | Control in a global information system (GIS) requires _____.
🗑
|
||||
show | Which of the following is true of information systems?
🗑
|
||||
show | Implementing a(n) _____ can be difficult because countries differ in culture, politics, social and economic infrastructures, and business methods.
🗑
|
||||
show | One of the issues with the _____ structure is that subsidiaries rely on headquarters for all process and control decisions as well as system design and implementation.
🗑
|
||||
Operational | show 🗑
|
||||
show | Which of the following statements is true of a global organization structure?
🗑
|
||||
different character sets used for the names of people and places | show 🗑
|
||||
show | The _____, which indicates the start of the design phase, is created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC).
🗑
|
||||
show | Which of the following increases the risk of leaking confidential information to competitors?
🗑
|
||||
physical design | show 🗑
|
||||
show | With _____, an organization chooses an outsourcing company in a neighboring country, such as when a U.S. organization chooses a company in Canada or Mexico.
🗑
|
||||
maintenance phase | show 🗑
|
||||
Operational feasibility | show 🗑
|
||||
show | In the design phase of the systems development life cycle (SDLC), the _____ is an overview of the system and does not include hardware or software choices.
🗑
|
||||
show | A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex process into simpler, more manageable, and more understandable subprocesses.
🗑
|
||||
Rapid application development (RAD) | show 🗑
|
||||
onshore outsourcing | show 🗑
|
||||
Immediate feedback from users | show 🗑
|
||||
show | One shortcoming of rapid application development (RAD) is _____.
🗑
|
||||
show | _____ helps reduce the backlog in producing information systems and improve flexibility in responding to users’ information needs.
🗑
|
||||
show | Identify a similarity between agile methodology and extreme programming (XP).
🗑
|
||||
planning phase | show 🗑
|
||||
A lengthy time frame makes a request for proposal less appealing. | show 🗑
|
||||
show | Identify a difference between the systems development life cycle (SDLC) and extreme programming (XP).
🗑
|
||||
waterfall model | show 🗑
|
||||
proof-of-concept prototype | show 🗑
|
||||
show | Identify a true statement of the Critical Path Method (CPM).
🗑
|
||||
show | Identify a true statement of extreme programming.
🗑
|
||||
A joint application design session centres on a structured workshop in which users and system professionals come together to develop an application. | show 🗑
|
||||
planning phase | show 🗑
|
||||
show | Which of the following is an internally identified problem in information systems?
🗑
|
||||
logical design | show 🗑
|
||||
show | Which of the following statements is true of an e-distributor?
🗑
|
||||
show | In manufacturing, identify one of the major links in the supply chain.
🗑
|
||||
show | The _____ component of an enterprise resource planning (ERP) system collects and analyzes relevant internal and external data and information needed by other functions.
🗑
|
||||
Personalization | show 🗑
|
||||
manufacturers | show 🗑
|
||||
brokerage | show 🗑
|
||||
Distribution centers | show 🗑
|
||||
show | In the context of e-marketplaces, a company can purchase a(n) _____ package that might include services from different vendors, but the e-distributor coordinates them into one package for customers.
🗑
|
||||
An enterprise system is an application used in all the functions of a business. | show 🗑
|
||||
show | Which of the following is a disadvantage of an enterprise resource planning (ERP) system?
🗑
|
||||
Financial reporting | show 🗑
|
||||
show | Which of the following helps businesses maintain a competitive edge in the supply chain by solving time-constraint problems for international trade and making it possible to conduct business around the clock?
🗑
|
||||
inventory management | show 🗑
|
||||
Traditional EDI is more beneficial when there are more companies in the EDI network. | show 🗑
|
||||
show | In supply chain management (SCM), which of the following is substituted by companies for printing, mailing, and faxing paper documents?
🗑
|
||||
online auction | show 🗑
|
||||
“Web-based” EDI reduces the cost of transmitting documents with the help of the Internet. | show 🗑
|
||||
Knowledge management (KM) | show 🗑
|
||||
show | In a manufacturing firm’s supply chain management (SCM) system, which flow oversees order transmission?
🗑
|
||||
show | In a manufacturing firm’s supply chain management (SCM) system, which flow handles credit terms and payment schedules?
🗑
|
||||
purchasing/procurement | show 🗑
|
||||
It improves operational efficiency and manages inventory. | show 🗑
|
||||
show | In a customer relationship management (CRM) system, which of the following is effective in tracking and analyzing customers’ buying patterns?
🗑
|
||||
show | Which of the following statements is true of online auctions?
🗑
|
||||
show | Which of the following systems’ goal is to improve services offered to consumers and use consumer contact information for targeted marketing?
🗑
|
||||
Reduction in stress levels | show 🗑
|
||||
The decision maker’s intuition plays a major role in one-time decisions. | show 🗑
|
||||
show | In the decision support system (DSS) environment, a _____ focuses on how the DSS is implemented and usually addresses questions about data storage, file structure, user access, response time, and security measures.
🗑
|
||||
Semistructured | show 🗑
|
||||
semistructured | show 🗑
|
||||
show | For a(n) _____ to be useful, it should collect data related to an organization’s critical success factors—issues that make or break a business.
🗑
|
||||
show | According to Peter G. Keen, a former MIT professor, which of the following is a benefit of a decision support system (DSS)?
🗑
|
||||
show | _____ is a collection of applications that supports decision makers by providing access to a shared environment and information.
🗑
|
||||
Points | show 🗑
|
||||
Intelligent agents | show 🗑
|
||||
show | Research and development is an example of a(n) _____ decision.
🗑
|
||||
unstructured | show 🗑
|
||||
show | In which of the following areas is a semistructured decision often used?
🗑
|
||||
show | A GIS with analytical capabilities evaluates the impact of decisions by interpreting _____.
🗑
|
||||
show | Which of the following tasks performed by managers uses an executive information system (EIS)?
🗑
|
||||
show | Identify a disadvantage of group support systems (GSSs)?
🗑
|
||||
show | In the _____ of the decision-making process, data is collected from internal and external sources and processed.
🗑
|
||||
show | Setting queue priorities is a type of _____ decision at the operational management level.
🗑
|
||||
show | _____ uses the geographic information system (GIS) application to dispatch personnel and equipment to crime and fire locations.
🗑
|
||||
show | Identify a task performed by a geographic information system (GIS).
🗑
|
||||
Electronic meeting systems | show 🗑
|
||||
Introducing a new product | show 🗑
|
||||
Structured | show 🗑
|
||||
geographic information system (GIS) | show 🗑
|
||||
Desktop conferencing enables participants to have multiple video windows open at one time. | show 🗑
|
||||
DENDRAL | show 🗑
|
||||
expert system | show 🗑
|
||||
Inference engine | show 🗑
|
||||
Monitoring and surveillance | show 🗑
|
||||
show | _____ agents can serve as search engines, site reminders, or personal surfing assistants.
🗑
|
||||
show | Which of the following is true of integrating an expert system into the database component of a DSS?
🗑
|
||||
knowledge acquisition facility | show 🗑
|
||||
Meta-knowledge | show 🗑
|
||||
show | In the context of expert systems, _____ consist of common sense, rules of thumb, educated guesses, and instinctive judgments.
🗑
|
||||
show | In forward chaining technique used by the inference engine component of an expert system, the _____ condition is evaluated first.
🗑
|
||||
show | Identify the characteristic of a sophisticated intelligent agent that demonstrates its ability to operate with minimum input.
🗑
|
||||
personal | show 🗑
|
||||
inference engine | show 🗑
|
||||
show | Hewlett-Packard uses _____ reasoning to assist users of its printers.
🗑
|
||||
show | The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.
🗑
|
||||
artificial neural network | show 🗑
|
||||
show | _____ was developed so that users could communicate with computers in human language.
🗑
|
||||
show | The _____ characteristic of an intelligent agent demonstrates the agent’s ability to migrate from one platform to another with a minimum of human intervention.
🗑
|
||||
bots | show 🗑
|
||||
show | _____ is an example of an expert system that can be applied to various financial applications.
🗑
|
||||
Genetic algorithms | show 🗑
|
||||
show | Adding deductive reasoning to traditional DBMS functions is a benefit of integrating an expert system into the database component of a(n) _____.
🗑
|
||||
Fuzzy logic | show 🗑
|
||||
show | _____ systems have been one of the most successful artificial intelligence (AI)-related technologies.
🗑
|
||||
show | Which of the following statements is true of personal robots?
🗑
|
||||
hybrid | show 🗑
|
||||
Software as a service | show 🗑
|
||||
Central coordinating processor and software system | show 🗑
|
||||
Biometric | show 🗑
|
||||
virtual world | show 🗑
|
||||
show | _____ radio frequency identification (RFID) tags have no internal power supply.
🗑
|
||||
show | In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.
🗑
|
||||
show | Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
🗑
|
||||
show | GuardIT,security company, work w companies2obtain intel property&protect em.deals w secure data4variety of software&e-commerce agreements,TM&patent licenses.cloud comput optn wld b most suitable?
🗑
|
||||
cave automatic virtual environment (CAVE) | show 🗑
|
||||
nanoscale | show 🗑
|
||||
Regulatory compliance | show 🗑
|
||||
Cloud computing | show 🗑
|
||||
Data segregation | show 🗑
|
||||
community | show 🗑
|
||||
scanner | show 🗑
|
||||
show | _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
🗑
|
||||
show | VT offer cloud comput serv to several data centers in the world.provide comp infrastructure - servers, networking elements, and SaaS.own the equipment&are liable for housing,functioning,&maintaining it.type of cloud comput model VT delivers as a service?
🗑
|
||||
networked communication | show 🗑
|
||||
Platform as a service (PaaS) | show 🗑
|
||||
push | show 🗑
|
||||
show | According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.
🗑
|
||||
Biometrics | show 🗑
|
||||
metropolitan area networks | show 🗑
|
||||
push | show 🗑
|
||||
show | In the artificial intelligence (AI) field, _____ engineers try to discover “rules of thumb” that enable computers to perform tasks usually handled by humans.
🗑
|
||||
show | _____ agents usually track and report on computer equipment and network systems to predict when a system crash or failure might occur.
🗑
|
||||
show | _____ networks are networks that learn and are capable of performing tasks that are difficult with conventional computers.
🗑
|
||||
show | The knowledge base component of an expert system must include _____, which consists of rules related to a problem or discipline.
🗑
|
||||
case-based | show 🗑
|
||||
Autonomy | show 🗑
|
||||
then | show 🗑
|
||||
show | _____ was developed so that users could communicate with computers in human language.
🗑
|
||||
Variable Assembly Language (VAL) | show 🗑
|
||||
heuristics | show 🗑
|
||||
bots | show 🗑
|
||||
show | Which of the following statements is true of personal robots?
🗑
|
||||
Inference engine | show 🗑
|
||||
show | Explanation capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
🗑
|
||||
show | In design and implementation of any _____ reasoning application there are 4 Rs involved.
🗑
|
||||
show | In the context of integrating artificial intelligence technologies into a decision support system’s model base component, _____ can be added to include heuristics in the model base’s analysis capabilities.
🗑
|
||||
Humanlike interface | show 🗑
|
||||
show | The four Rs involved in design and implementation of any case-based reasoning application are retrieve, reuse, revise, and _____.
🗑
|
||||
knowledge acquisition facility | show 🗑
|
||||
robots | show 🗑
|
||||
show | Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____.
🗑
|
||||
show | Learning capabilities can be added to a decision support system (DSS) by integrating it with a(n) _____
🗑
|
||||
show | Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.
🗑
|
||||
show | In the context of the decision-making analyses that use information technology, _____ analysis is available in spreadsheet programs such as Microsoft Excel.
🗑
|
||||
show | An NLP system provides a question-and-answer setting that is particularly useful with _____.
🗑
|
||||
Expert | show 🗑
|
||||
show | _____ could be useful for authentication purposes in voting via the Internet.
🗑
|
||||
show | Which of the following is used in clothing and footwear to cut down bacteria growth and improve stain resistance?
🗑
|
||||
personal area network (PAN) | show 🗑
|
||||
show | Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.
🗑
|
||||
show | _____ means enabling users to act on objects in a virtual reality (VR) environment, such as using a data glove to pick up and move objects.
🗑
|
||||
it does not guarantee that an application will fully meet an organization’s needs | show 🗑
|
||||
show | The _____ is capable of imaging atoms and incorporating nanomaterial layers into hard disk recording heads and magnetic disk coatings.
🗑
|
||||
push | show 🗑
|
||||
show | In order to read a QR (quick response) code using a smartphone, one must have the _____ app.
🗑
|
||||
hybrid | show 🗑
|
||||
radio frequency identification tag | show 🗑
|
||||
quick response code | show 🗑
|
||||
show | _____ radio frequency identification (RFID) tags can be embedded in a sticker or under the human or animal skin.
🗑
|
||||
show | According to the nomenclature of cloud computing, infrastructure as a service (IaaS) is also known as _____.
🗑
|
||||
show | In the context of virtual reality (VR) technology, _____ refers to giving users the sense that they are in another location, even one geographically far away, and can manipulate objects as though they are actually in that location.
🗑
|
||||
software as a service (SaaS) | show 🗑
|
||||
public | show 🗑
|
||||
Biometric | show 🗑
|
||||
show | _____ incorporates many recent technologies under one platform including the software as a service (SaaS) model and Web 2.0.
🗑
|
||||
metropolitan area networks | show 🗑
|
||||
show | WPis in the process of shifting its list of inven2cloud4easier access among its diff branches.company trying to find a cloud comput optn that offers highest cost saving&requires least amt of involv by IT mngrs.Wich cloud computing optn wld b the best4WP?
🗑
|
||||
show | With _____ technology, a Web server delivers information to users who have signed up for this service instead of waiting for them to request the information be sent to them.
🗑
|
||||
data segregation | show 🗑
|
||||
ASPs ensure that software is kept up to date, based on users’ requests. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
pace_sauce
Popular Business sets