CAPP 71243

subject Type Homework Help
subject Pages 9
subject Words 1360
subject Authors Maeve Cummings, Stephen Haag

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Automatic speech recognition systems complete three steps. Which step matches your
spoken phonemes to a phoneme sequence stored in an acoustic model database?
A.Feature analysis
B.Signal capture and arrangement
C.Language processing
D.Pattern classification
How is RAM different from a CPU?
A.RAM usually sits outside the computer; the CPU is located inside the computer
B.The CPU is able to process data; RAM only holds it
C.RAM is the real brain of the computer, not the CPU
D.RAM is an obsolete CPU
Which DSS component stores and maintains the information you want your DSS to
use?
A.Query management
B.Data administration
C.Model management
page-pf2
D.Data management
Which of the following is not a key resource of MIS?
A.People
B.Information
C.Technology
D.Methods
What is another term for the nightly compilation of code?
A.Prototype
B.Build
C.Nightly component
D.Project milestone
page-pf3
An SOA mentality has many advantages. Which of the following is not one of these?
A.It allows an organization to be lean, efficient, and effective
B.Is reactive in nature and to waits until technology and changes in the environment are
stable
C.Responds quickly to and adapts to new advances in technology
D.Transforms its processes, structure, and HR initiatives to mach a changing workforce
What type of network threat is spoofing or sending fraudulent email?
A.Confidentiality
B.Authenticity
C.Integrity
D.Availability
If you were to take facts about your business, mix them with historical information, and
then create a computer simulation to help you understand future events, you would be
creating ____.
A.A database
page-pf4
B.Artificial intelligence
C.A model
D.Facsimiles
What is an encryption system that uses two keys: a public key that everyone can have
and a private key for only the recipient?
A.Encryption
B.Public key encryption
C.Intrusion-detection software
D.Security-auditing software
If you were to download a computer game from the Internet and then sell this game to
your friends, what would you be doing to the person who developed the game?
A.Spamming them
B.Phishing their software
C.Pirating their software
D.Stealing their profits
page-pf5
In virtual reality, what must the system capture before it can process needed
information?
A.Physiological movements and responses
B.Holographic signals
C.Radio waves that are bounced back for the object that the system is interacting with
D.Physiological responses, holographic signals, and bounced radio waves
When you extend a transaction processing system so that customers can access the Web
and place orders without customer assistance, you are creating a(n) _____ system.
A.Emerging
B.Operational
C.Customer self-service
D.Management information system
page-pf6
Are ethical dilemmas easy to understand?
A.Yes, if you have a strong sense of self
B.Yes, if you are well educated
C.Yes, if you have a strong sense of self and are well educated
D.No, they usually arise from a clash between competing goals, responsibilities, and
loyalties
What is a project scope document?
A.A document that outlines the project's strategy, the responsibilities of project team
members, and the assessment measures that will determine the rate of success
B.A one-paragraph statement about the scope of the proposed project
C.A detailed document identifying the goals, scope and strategy for the proposed
project
D.A document that identifies the parameters or boundaries of the proposed system and
how it fits into existing systems
Which of the following is not a primary goal of an ERP system within a
service-oriented architecture?
A.Provide interoperability between different vendors of ERP systems
B.Open communications and access points to customers
page-pf7
C.Conceal the IT infrastructure that supports ERP systems
D.Provide interoperability between ERP systems within your organization
What type of manager uses IT to develop various requirements, budgets, and schedules
for projects?
A.Project manager
B.Entrepreneur
C.Business development manager
D.Management analyst
Optimizing what keeps the cost of transporting materials as low as possible?
A.Logistics
B.Production
C.Cost and Price
D.Fulfillment
page-pf8
When is rivalry among existing competitors high in the Five Forces Model?
A.When there are a large number of competitors in a market
B.When there are a small number of competitors in a market
C.When the competition in a market is fierce
D.When the competition in a market is more complacent allowing some businesses to
excel
Which computer tool creates a secure and private connection between a Web client's
computer and a Web server's computer so that files sent from one to another are kept
confidential?
A.Shared Fusion Connectivity (SFC)
B.Secure Sockets Layers (SSL)
C.Secure Electronic Transaction (SEL)
D.Public Coder detection (PCD)
What is the difference between a reverse auction and mass customization?
page-pf9
A.Reverse auction is most often found in B2B whereas mass customization is often
found in B2C
B.Reverse auction requires a bid from consumers whereas mass customization requires
a bid from suppliers
C.Mass customization require a click-and-mortar environment; reverse auctions do not
D.Mass customization can sell digital products; reverse auctions sell commoditylike
products
If you needed tutoring in Math or Science for a fraction of the price charged by most
neighborhood tutoring services, where would you likely turn to?
A.US based Internet tutoring services
B.India based Internet tutoring services
C.Online, and self-directed, education
D.Local tutoring services with Internet support
Why do managers increasingly depend on technology to help carry out their
responsibilities?
A.Organizations operate in increasingly complex environments
B.Organizations operate in increasingly fast changing environments
page-pfa
C.Organizations operate in increasingly complex and fast changing environments
D.Organizations need to give the appearance of being technologically advanced
What is a CAVE?
A.A simulation device used to train and instruct special forcers in the climbing,
firefighting, and search and rescue industry
B.A three-dimensional computer simulation in which you can actively and physically
participate
C.A virtual reality room that can display images and other people from other CAVEs
D.An advanced and secured communication system used for extremely sensitive data
Which of the following protects the intangible creative work that is embodied in
physical form?
A.Copyright
B.Intellectual property
C.Fair Use Doctrine
D.Pirating laws
page-pfb
According to the Outsourcing Research Council, which business function is the top
outsourcing area for many contemporary companies?
A.IT
B.Accounting
C.Human Resources
D.Finance
What is a legacy information system (LIS)?
A.A massive, outdated information system
B.A powerful DBMS that supports ERP
C.A Web-based information system that connects the information collected from
distinct systems
D.A retired information system
Which infrastructure-centric metric measures the speed at which a system can process a
transaction?
page-pfc
A.Transaction speed
B.Accuracy
C.Throughput
D.Reaction time
What is the term associated with buyers and the number of choices they have regarding
from whom they can buy?
A.Buyer independence
B.Buyer dependence
C.Supplier power
D.Supplier dependence

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.