CAPP 23794

subject Type Homework Help
subject Pages 24
subject Words 2719
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A database management system (DBMS) allows you to specify the logical organization
for a database and access and use the information within a database.
According to some experts, eye-tracking studies are among the most reliable measures
of consumer behavior.
A primary key from one file and a foreign key from another file are used to create a
relationship between two files in a relational database.
Firewalls are used to block access to private information from invalid users.
page-pf2
Competitive advantage occurs for a company when its competition has more to offer a
customer than it does.
Webcam captures analog video to upload to the Web.
The greater the number of pixels on a computer screen the clearer and crisper the screen
images are displayed.
page-pf3
An expert system is fundamentally the same as a DSS.
A marketing mix is the set of technology tools that the firm uses to pursue its marketing
objectives in the target market.
A 3-tier infrastructure is the most common approach for Web applications.
Virtual reality is a three-dimensional computer simulation in which you actively and
physically participate.
page-pf4
Application service providers have become very popular because they are noted to keep
data very private.
A financial cybermediary is an Internet-based company that makes it easy for one
person to pay another over the Internet.
Multitasking allows you to work with more than one piece of software at a time.
About 1 in 3 people will become the victims of identity theft from phishing.
page-pf5
Companies can monitor employee e-mail by using software to scan for specific words
in the text or subject line.
Examples of input devices include a keyboard, mouse, or speaker.
An expert system is also called a knowledge-based system.
page-pf6
If an expert system recognizes a new pattern it can set up a rule based on it.
The Mac OS is more widely used than Windows XP.
Extreme programming (XP) methodology enforces strict design guidelines thus
inhibiting user changes in requirements.
The data definition subsystem includes security management facilities.
page-pf7
A back office system is used to fulfill and support customer orders.
ERP does not help with inventory management.
A reverse auction occurs when a seller posts a list of items for sale and then accepts
bids from interested buyers.
page-pf8
If you need to add a new field to a database, you would use the data manipulation
system.
The information quality attribute of timeliness has only one aspect - having access to
information when you need it.
A client/server network is a network in which one computer is a client and provides
services to the other computers, which are called servers.
Copyright is the legal protection afforded an expression of an idea, such as a song,
video game, and some types of proprietary documents.
page-pf9
The government is using digital technologies to become more competitive.
Encryption scrambles the contents of a file so you can't read it without having the right
decryption key.
Identity theft occurs when someone forges your identity for fraudulent purposes.
page-pfa
Online training is excellent when employees need one-on-one time with a trainer.
The decision maker must rely on information technology to support the analysis and
decisions being made.
Companies can monitor employee e-mail by using software to track the amount of
e-mail activity associated with specific addresses.
The third step in the SDLC is maintenance.
page-pfb
The systems development life cycle is an unstructured approach for developing
information systems.
Bandwidth refers to the capacity, or the amount of information, that can be transferred
through a communications line in a given time.
Business intelligence supports the capturing, organization, and dissemination of
knowledge throughout an organization.
page-pfc
What is the percentage of potential customers who visit your site who actually buy
something?
A.Hit rate
B.Conversion rate
C.Click-through
D.Viral speed
What is a value chain?
A.The series of business processes, each of which adds value to products or services for
your customers
B.A set of products and services that have proved valuable and profitable for your
business
C.The information or feedback from customers that is then used to improve the quality
of your products or services
D.The series of business partners and team members that are directly responsible for
producing and processing a set of products or services for your customers
What is the difference between the design phase and the analysis phase?
page-pfd
A.The analysis phase follows the design phase and examines the requirements
developed during the design phase
B.The design phase creates the code from the logical requirements developed in the
analysis phase
C.Analysis and design belong to the same phase and create an iterative process between
the two activities
D.The design phase takes the requirements developed in the analysis phase and creates
a design from them
Which type of software is used primarily with numbers to perform calculations and
create graphs?
A.Personal productivity
B.Spreadsheet
C.Word processing
D.Database management system
What are the set of pathways where information moves from your CPU and
motherboard to all of your other hardware devices such as your monitor, speakers, and
printer?
A.System bus
B.Expansion slot
page-pfe
C.Expansion card
D.Expansion bus
There are some problems associated with shared networks. Which of the following is
not one of these problems?
A.Information transmitted over hubs isn't private
B.Computers can transmit information simultaneously requiring more bandwidth
C.Computers are interrupted every time a message is sent over the network
D.Hubs have collisions
Which major form of accounting involves working within a company to manage
investor relations, banking relations, daily financial affairs, and planning new products
and services?
A.Public practice
B.Industry
C.Government
D.Non-profit
page-pff
What is a digital dashboard?
A.A new type of electronic dashboard for high-priced cars that displays GPS
information alongside of traditional information
B.A learning environment for online educational courses
C.A computer tool that provides competitive information from external sources
D.A computer screen that provides tailored, current snapshots of information and trends
Which data warehouse tools are slice-and-dice techniques that allow you to view
multidimensional information from different perspectives?
A.Query-and-reporting
B.Intelligent agents
C.OLTP
D.Multidimensional analysis
page-pf10
What is a contemporary name for executive information systems?
A.Strategic information systems (SIS)
B.Human resources information systems (HRIS)
C.Digital dashboards
D.Management Information Systems (MIS)
If you received repeated bills for a credit card that you didn't own, what would you
probably be a victim of?
A.Phishing
B.Wrongful actions
C.Service fraud
D.Identity theft
Which type of utility software is used to organize information on your hard disk in the
most efficient way?
A.Disk optimization
B.Database management
C.Disk defragmentation
page-pf11
D.File management
Which type of device allows you to send and receive information from another
computer?
A.Telecommunication
B.Telepathy
C.CPU
D.RAM
What day occurs after Black Friday; when consumers go back to work and shop online
on the Internet for products they found on Black Friday on retail shelves?
A.Black Saturday
B.Cyber Monday
C.Red Tuesday
D.Money Friday
page-pf12
_____ applies to the implementation of an idea.
What is cache memory?
A.Temporary storage for instructions waiting to be processed
B.Extra storage space for temporary data files
C.The device that decodes and executes instructions
D.Storage space for information that has been processed
Which intelligent agent searches for information of some kind and brings it back to the
user?
A.Information agent
B.Reporting agent
C.User agent
D.Predictive agent
page-pf13
Which type of software extends word processing to include design and formatting
techniques to enhance the appearance of a document?
A.Personal productivity
B.Spreadsheet
C.Presentation
D.Desktop publishing
Which of the following is a disadvantage to prototyping?
A.Prototyping does not encourage active user participation
B.Prototyping does not help resolve discrepancies among users
C.Prototyping does not help determine technical feasibility
D.Prototyping does not give an indication of performance under operational conditions
What type of intelligent agent operates in a data warehouse discovering information?
A.Data-mining agent
page-pf14
B.Predictive agent
C.Reporting agent
D.Monitoring-and-surveillance agent
Which of the following tasks can be handled by a PDA?
A.Calendaring
B.Surfing the Web
C.Note taking
D.All of the above
What must you have before you can effectively use a DSS?
A.Fast and ample bandwidth
B.Considerable knowledge or expertise
C.Powerful systems capable of manipulating large amounts of information
D.Programming knowledge
page-pf15
Which of the following is not a type of connector or port?
A.USB
B.Serial connector
C.Parallel connector
D.System bus
What term refers to the electronic integration of government agencies up and down
federal, state, and local government levels?
A.I-Interaction
B.Vertical government integration
C.E-Rule
D.Open government
Which of the following uses a very thin glass or plastic fiber through which pulses of
light travel?
page-pf16
A.Cat 5
B.Optical fiber
C.Twisted pair
D.Coax
XD cards, SD cards, CF cards, SM cards, and memory sticks are what type of storage?
A.Optical storage
B.Flash memory
C.Magnetic storage
D.CD storage
Which of the following is a circuit board that you insert into an expansion slot so that
you can connect it to a peripheral device?
A.System card
B.Port
C.Expansion card
D.Expansion bus
page-pf17
Which of the following systems uses information about customers to gain insights into
their needs, wants, and behaviors in order to serve them better?
A.Supply chain management (SCM)
B.Transaction information processing (TIP)
C.Enterprise resource management (ERP)
D.Customer relationship management (CRM)
Which of the following is a characteristic of a firewall?
A.Examines each message as it seeks entrance to the network
B.Blocks messages without the correct markings from entering the network
C.Detects computers communicating with the Internet without approval
D.Each of these items are characteristics of a firewall
Which technology allowed companies to transmit voice over existing Internet
page-pf18
connections?
A.T1
B.VoIP
C.VPN
D.T1 and DS3
When you purchase your books for this course from an online source such as
Amazon.com, you are conducting which type of e-commerce?
A.I-BC
B.E-CB
C.C2B
D.B2C
What type of IT infrastructure involves little or no sharing of IT and other computing
resources?
A.Centralized
B.Distributed
C.Client/server
page-pf19
D.Decentralized
Which type of media represents the paths, or physical channels, in a network over
which information travels?
A.Communications media
B.Wired media
C.Wireless media
D.Routers
What is it called when a business provides enabling technologies to their customers so
that they are able to create, modify, and oversee the development of a product or
service?
A.Multi-state production
B.Customer directed manufacturing (CDM)
C.Crowdsourcing
D.I-Customer
page-pf1a
A(n) _____ CPU can process letters and special characters without converting them to
their binary equivalents.
A(n) _____ is a tool you use to capture information and commands.
A(n) _____ contains facilities to help you develop transaction-intensive applications.
_____ software helps you save information if your system crashes and you're forced to
turn it off and then back on again.
page-pf1b
Malware or malicious software can include _____, _____, and _____.
A(n) _____ automatically tracks inventory and information among business processes
and across companies.
A(n) _____ person knows how and when to apply technology, while an _____ person
understands what information is needed and how to obtain that information.
A(n) _____ records information about you during a Web surfing session such as what
Web sites you visited, how long you were there, what ads you looked at, and what you
bought.
page-pf1c
In an organization, _____ is responsible for the more technical and operational aspects
of managing the information contained in organizational information repositories.
_____ is held in a classroom environment and lead by an instructor.
A _____ is a type of hacker who is engaged in corporate espionage.
A(n) _____ is an extension of a TPS that places technology in the hands of an
organization's customers and allows them to process their own transactions.
page-pf1d
A(n) ____________ facilitates the automation and management of business processes.
A(n) _____ is a microwave repeater located in space.
If a company is still using a mainframe for business processing, they most likely have a
_____ infrastructure.
_____ agents observe and report on equipment.
page-pf1e
_____ is utility software that filters unwanted email for your inbox.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.